Search Results for "intrusion detection system matlab code"

Showing 9 open source projects for "intrusion detection system matlab code"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 1
    ByteHook

    ByteHook

    ByteHook is an Android PLT hook library

    ByteHook is a ByteDance-hosted project whose name suggests a hooking or instrumentation library, likely used for hooking system calls or API calls for monitoring, sandboxing or instrumentation. The repository appears to aim at low-level hooking/injection capabilities, perhaps to support runtime introspection, behavioral monitoring, or hooking-based instrumentation (e.g. for security, tracing, sandboxing, or debugging). Because hooking is a common technique for intercepting library or system...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    CNVMM

    CNVMM performs copy number variations detection

    CNVMM specializes in identifying copy number variations (CNVs) when there are repeated sequences in the reference genome. The input file is a single short read mapping result from any short read aligners. However, NNmapper or Bowtie2, which detect all mapping results for multi-reads, are recommended. To use the code, MATLAB installation is required. Mac or Linus system is required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Facial Expression Recognition

    Facial Expression Recognition System - Matlab source code

    We propose an algorithm for facial expression recognition which can classify the given image into one of the seven basic facial expression categories (happiness, sadness, fear, surprise, anger, disgust and neutral). PCA is used for dimensionality reduction in input data while retaining those characteristics of the data set that contribute most to its variance, by keeping lower-order principal components and ignoring higher-order ones. Such low-order components contain the "most important"...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    GoIFISH

    GoIFISH

    for the semi-automated analysis of IFISH images

    GoIFISH has been developed for the analysis of IFISH (Immunofluorescence + Fluorescence in situ Hybridisation) images, performing nuclear, membrane and spot detection. Users can manually edit segmentation results, perform background adjustments, construct heatmaps, topology maps, and perform cell classification. All results can be exported for further analysis. GoIFISH has been developed in MATLAB, however binaries are provided to run the program outside of the MATLAB environment. Source code is also available for download. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    VOC-DPM

    VOC-DPM

    Object detection system using deformable part models (DPMs)

    The VOC-DPM repository is an implementation of an object detection system built on deformable part models (DPMs) and latent SVM learning, specifically packaged as “voc-release5.” It is the companion code for Ross Girshick’s dissertation, and extends earlier work on discriminatively trained DPMs. The system supports a grammar-based representation for object models, allowing structures such as mixtures and hierarchies to represent parts and whole objects. It implements both latent SVM training...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Cellular-IDS

    Cellular IDS based on Samsung's Network Extender

    The source code LMG Security used to turn a Samsung-Verizon Network Extender into a Cellular Intrusion Detection System for less than $300. The project was demonstrated at Blackhat 2013 and DEFCON 21. The CIDS project can provide direct access to cellular traffic, allowing for analysis of mobile malware behavior in ways never before possible. For more information, see our blog post and whitepaper at http://lmgsecurity.com/blog/2013/07/26/diy-cellula .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    RIDSystem

    capturing packet and detecting intruders with their signature

    Introduction: This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc... Scope: Government authorities has lot of information about defence,revenue,income tax and many informations. Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application software over their network.It will be helpful to monitor all the activity in the network. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The Kernel Intrusion Detection System-KIDS, is a Network IDS, where the main part, packets grab/string match, is running at kernelspace, with a hook of Netfilter Framework. The project is not ready for use, then incomplete pieces of code may be found.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Turn-key secure credit card processing appliance
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB