zhangzhao156 / scalable-NIDSView external linksLinks
☆11Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for scalable-NIDS
Users that are interested in scalable-NIDS are comparing it to the libraries listed below
Sorting:
- UniCell Deconvolve Paper☆10Apr 25, 2023Updated 2 years ago
- ☆11Jul 3, 2022Updated 3 years ago
- ☆11Sep 8, 2022Updated 3 years ago
- Intrusion Detection System (IDS) for Wireless Sensor Networks (WSN)☆18Apr 5, 2013Updated 12 years ago
- ☆16May 8, 2020Updated 5 years ago
- Inferring Strange Behavior from Connectivity Pattern (PAKDD 2014, KAIS 2015)☆11Mar 27, 2015Updated 10 years ago
- Neo4j graphviz visualization☆12Apr 27, 2011Updated 14 years ago
- HUD for CI activity on `pytorch/pytorch`, provides a top level view for jobs to easily discern regressions☆13Feb 26, 2022Updated 3 years ago
- An R package implementing the NetEMD and NetDis network comparison measures☆14Jun 9, 2022Updated 3 years ago
- A Python notebook showcasing the use of Machine Learning for the task of bot detection, with an emphasis on e-commerce sites.☆14Jul 8, 2021Updated 4 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆13Oct 7, 2025Updated 4 months ago
- ☆14Apr 26, 2022Updated 3 years ago
- Easy implementations of GCN on Elliptic Datasets☆13Dec 19, 2020Updated 5 years ago
- ☆12Feb 1, 2020Updated 6 years ago
- code and dataset for spatialDWLS☆14Apr 18, 2021Updated 4 years ago
- ☆11Mar 20, 2024Updated last year
- ☆13Oct 11, 2021Updated 4 years ago
- Deep Graph Kernels☆13Nov 1, 2015Updated 10 years ago
- spSeudoMap: cell type mapping of spatial transcriptomics using unmatched single-cell RNA-seq data☆13Sep 29, 2024Updated last year
- ☆22Nov 16, 2025Updated 3 months ago
- ☆13Feb 15, 2024Updated 2 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- Codes for paper "An Embedding Approach to Anomaly Detection."☆13Dec 13, 2018Updated 7 years ago
- Research on cybersecurity data usage in research papers☆14Dec 15, 2017Updated 8 years ago
- Deep learning, classification on the WISDM dataset☆16Oct 11, 2022Updated 3 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems (NDSS'23)☆12Feb 9, 2023Updated 3 years ago
- ☆15Aug 9, 2023Updated 2 years ago
- image denoising (and background monitoring) by Robust Principal Component Analysis via ADMM☆14Jan 8, 2019Updated 7 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- Communication-efficient federated continual learning☆20Jan 3, 2023Updated 3 years ago
- Go library for interacting with Atlassian Crowd☆13Aug 31, 2018Updated 7 years ago
- ☆18May 9, 2024Updated last year
- Tools to help with LaTeX paper writing☆17Aug 15, 2023Updated 2 years ago
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Repository for transfer learning for anomaly detection.☆15Nov 28, 2019Updated 6 years ago
- Deep Learning for Structural Health monitoring☆20Sep 27, 2024Updated last year
- Assessing 📊 the impact of class imbalance on model performance and convergence for malware byteplot image 🌌 classification☆16Oct 9, 2023Updated 2 years ago
- ☆13Dec 13, 2021Updated 4 years ago