Search Results for "intrusion detection system matlab code"

Showing 9 open source projects for "intrusion detection system matlab code"

View related business solutions
  • EHS Software and Management System Icon
    EHS Software and Management System

    ERA offers the only full EHS&Q platform with advanced automation to drive your complete compliance.

    ERA Environmental Software Solutions develops web-based EHS management software for small, medium, and large manufacturers needing to comply with federal, provincial, and state regulations, monitor their air, water, and waste emissions and other environmental outputs, author and manage Safety Data Sheets (SDS) in more than 40 languages, or standardize their Health and Safety procedures for incident and inspection tracking, training delivery, and audit management. The platform also supports comprehensive reporting for programs like TRI, Tier II, Title V, NEI, and NPRI. Companies across the automotive, aerospace, general manufacturing, and paints and coatings industries, to name a few, rely on ERA’s all-in-one, SOC 2 Type II certified SaaS for complete coverage of their EHS needs.
    Learn More
  • Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud. Icon
    Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud.

    Power faster innovation with Teradata VantageCloud

    VantageCloud is the complete cloud analytics and data platform, delivering harmonized data and Trusted AI for all. Built for performance, flexibility, and openness, VantageCloud enables organizations to unify diverse data sources, run complex analytics, and deploy AI models—all within a single, scalable platform.
    Learn More
  • 1
    ByteHook

    ByteHook

    ByteHook is an Android PLT hook library

    ByteHook is a ByteDance-hosted project whose name suggests a hooking or instrumentation library, likely used for hooking system calls or API calls for monitoring, sandboxing or instrumentation. The repository appears to aim at low-level hooking/injection capabilities, perhaps to support runtime introspection, behavioral monitoring, or hooking-based instrumentation (e.g. for security, tracing, sandboxing, or debugging). Because hooking is a common technique for intercepting library or system...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    CNVMM

    CNVMM performs copy number variations detection

    CNVMM specializes in identifying copy number variations (CNVs) when there are repeated sequences in the reference genome. The input file is a single short read mapping result from any short read aligners. However, NNmapper or Bowtie2, which detect all mapping results for multi-reads, are recommended. To use the code, MATLAB installation is required. Mac or Linus system is required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Facial Expression Recognition

    Facial Expression Recognition System - Matlab source code

    We propose an algorithm for facial expression recognition which can classify the given image into one of the seven basic facial expression categories (happiness, sadness, fear, surprise, anger, disgust and neutral). PCA is used for dimensionality reduction in input data while retaining those characteristics of the data set that contribute most to its variance, by keeping lower-order principal components and ignoring higher-order ones. Such low-order components contain the "most important"...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    GoIFISH

    GoIFISH

    for the semi-automated analysis of IFISH images

    GoIFISH has been developed for the analysis of IFISH (Immunofluorescence + Fluorescence in situ Hybridisation) images, performing nuclear, membrane and spot detection. Users can manually edit segmentation results, perform background adjustments, construct heatmaps, topology maps, and perform cell classification. All results can be exported for further analysis. GoIFISH has been developed in MATLAB, however binaries are provided to run the program outside of the MATLAB environment. Source code is also available for download. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Enterprise AI Agents for Every Customer Moment Icon
    Enterprise AI Agents for Every Customer Moment

    For enterprise companies looking for AI Agents

    From chat to voice to SMS, every conversation gets a smart, personalized response powered by your policies, tone, and data.
    Learn More
  • 5
    VOC-DPM

    VOC-DPM

    Object detection system using deformable part models (DPMs)

    The VOC-DPM repository is an implementation of an object detection system built on deformable part models (DPMs) and latent SVM learning, specifically packaged as “voc-release5.” It is the companion code for Ross Girshick’s dissertation, and extends earlier work on discriminatively trained DPMs. The system supports a grammar-based representation for object models, allowing structures such as mixtures and hierarchies to represent parts and whole objects. It implements both latent SVM training...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Cellular-IDS

    Cellular IDS based on Samsung's Network Extender

    The source code LMG Security used to turn a Samsung-Verizon Network Extender into a Cellular Intrusion Detection System for less than $300. The project was demonstrated at Blackhat 2013 and DEFCON 21. The CIDS project can provide direct access to cellular traffic, allowing for analysis of mobile malware behavior in ways never before possible. For more information, see our blog post and whitepaper at http://lmgsecurity.com/blog/2013/07/26/diy-cellula .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    RIDSystem

    capturing packet and detecting intruders with their signature

    Introduction: This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc... Scope: Government authorities has lot of information about defence,revenue,income tax and many informations. Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application software over their network.It will be helpful to monitor all the activity in the network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Kernel Intrusion Detection System-KIDS, is a Network IDS, where the main part, packets grab/string match, is running at kernelspace, with a hook of Netfilter Framework. The project is not ready for use, then incomplete pieces of code may be found.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Turn-key secure credit card processing appliance
    Downloads: 0 This Week
    Last Update:
    See Project
  • Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
 Icon
    Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.


    How the world collects public web data

    Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB