Showing 10 open source projects for "intrusion detection system code in java"

View related business solutions
  • The All-in-One Commerce Platform for Businesses - Shopify Icon
    The All-in-One Commerce Platform for Businesses - Shopify

    Shopify offers plans for anyone that wants to sell products online and build an ecommerce store, small to mid-sized businesses as well as enterprise

    Shopify is a leading all-in-one commerce platform that enables businesses to start, build, and grow their online and physical stores. It offers tools to create customized websites, manage inventory, process payments, and sell across multiple channels including online, in-person, wholesale, and global markets. The platform includes integrated marketing tools, analytics, and customer engagement features to help merchants reach and retain customers. Shopify supports thousands of third-party apps and offers developer-friendly APIs for custom solutions. With world-class checkout technology, Shopify powers over 150 million high-intent shoppers worldwide. Its reliable, scalable infrastructure ensures fast performance and seamless operations at any business size.
    Learn More
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    Discovery

    Discovery

    Nepxion Discovery is a solution for Spring Cloud

    Nepxion Discovery is a solution for Spring Cloud with blue green, gray, route, blacklist, limitation, circuit breaker, degrade, isolation, monitor, tracing, dye, failover, async agent. Only one or more services are upgraded at a time, the upgrade is completed and monitored and observed, and this process is performed continuously until all the old versions in the cluster are upgraded to the new version. In the process of stopping the old version, it is impossible to accurately calculate...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    X's Recommendation Algorithm

    X's Recommendation Algorithm

    Source code for the X Recommendation Algorithm

    The Algorithm is Twitter’s open source release of the core ranking system that powers the platform’s home timeline. It provides transparency into how tweets are selected, prioritized, and surfaced to users, reflecting Twitter’s move toward openness in recommendation algorithms. The repository contains the recommendation pipeline, which incorporates signals such as engagement, relevance, and content features, and demonstrates how they combine to form ranked outputs. Written primarily in...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JPPF

    JPPF

    The open source grid computing solution

    JPPF makes it easy to parallelize computationally intensive tasks and execute them on a Grid.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    OovAide

    C++, Java IDE with auto class, sequence, zone, dependency, diagrams

    The OovAide project used to be named oovcde. Searching the web will bring up more information about oovcde at this time. The OovAide project is a C++ or Java analysis IDE for Windows or Linux with an automated multi-tasking build system, cross compiler support, an analysis tool based on CLang that creates UML class, component, sequence as well as zone and portion diagrams from C++ or Java source, static analysis and test coverage. The diagrams allow navigation through the source code,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    XML-CF-lib

    XML-CF-lib

    TeleScope-CF XML Content Filtering Library

    ...C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    telescope-cf-library

    telescope-cf-library

    TeleScope-CF XML Content Filtering Library

    ...C code has been re-factored into Java with minor modifications. This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    This project enables Java applications to access detailed information about the host on which the JVM is running. This code was originally developed to run on a billion $ company's Grid System for host detection, and is now being released publicly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • 10
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.