Sir,can you suggest if we have to do research in this area in 2023-24 what new we can do, means using ml,and DL what new we can do in intrusion detection,is working in hybrid model(for something new) is still a research gap or not. pls suggest.
Thanks so much bro.. my question is if Can I use undersampling techniques before Splitting the dataset into training and testing..because i'm working on the same research paper 📜
Great work, explanation and findings as well. Is it possible to have the source code of the project? I am actually working on a similar topic and I believe sharing the codes with me will be very helpful. Thank you and once again, congratulations for the great work.
very good explanation thanks you,, Is it possible to have the code of this project. I need it to make this clear for me i am working on a similar topic.... can you help me please!!!
Thank u for clear explanation, can u plz explain the implementation of ur work with implementing code? which program u used??
Sir,can you suggest if we have to do research in this area in 2023-24 what new we can do, means using ml,and DL what new we can do in intrusion detection,is working in hybrid model(for something new) is still a research gap or not.
pls suggest.
Thanks so much bro.. my question is if Can I use undersampling techniques before Splitting the dataset into training and testing..because i'm working on the same research paper 📜
Nice explanation. Thanks for your hard work and effort.
Could you please do more videos about these topic. Thanks
How can we implement & detect in real time network traffic...?
can you please elaborate the dataset that you have used? Like, which packet you call a anomaly or intrusion packet, and which are clean one!?
very good and thank you.
I am working on this topic as well. Can you please share the steps of implementation and the documentation.
Great work, explanation and findings as well. Is it possible to have the source code of the project? I am actually working on a similar topic and I believe sharing the codes with me will be very helpful. Thank you and once again, congratulations for the great work.
Please find below, link to my repository with source code
github.com/LearnDeepLearningOrg/NetworkIntrusionDetection
@@rajuintrepid Thank you so much and well appreciated. Is it okay if I can have your email? Once again, thanks a lot and this is well appreciated.
Can this be used in Iot intrusion detection?
Hey Did You Implement This Project ? If yes can you Guide me through the steps. It will be very Helpful For Me.
very good explanation thanks you,, Is it possible to have the code of this project. I need it to make this clear for me i am working on a similar topic.... can you help me please!!!
I also want, if possible please send me on patel.nri1@gmail.com
Sir I want to access you Paper that you have published for my research work. I was tried many to access through Kindly
Please access the published paper here: sersc.org/journals/index.php/IJAST/article/view/25273. Thank you.
bro did you get the paper pdf if you can you give me i am having trouble registaring
@@rajuintrepid Still I am not be able to access.....
Kindly do help. If it is possible Kindly share your mail ID so that I can contact you.🙏
Hi. How do I deploy this IDS on a real network?
Please give the copy libk of your published paper.so that i an take reference
where to get this presentation slides....
How to implement the code for different dataset
Please review the source code from this location github.com/LearnDeepLearningOrg/NetworkIntrusionDetection. Thank you.
Hi.. great explanation. Can you please help me with the source code, iam working on a similar topic
Thank you :)
Hii sir can u pls explain phishing detection using URLs in deep learning by using CNN and LSTM
Can you please share the publication ?
Please access the published paper here: sersc.org/journals/index.php/IJAST/article/view/25273. Thank you.
bro did you get the paper pdf if you can you give me i am having trouble registaring
if it is research article can someone please share this..
Please access the published paper here: sersc.org/journals/index.php/IJAST/article/view/25273. Thank you.
bro did you get the paper pdf if you can you give me i am having trouble registaring
please i need project ideas please
Bro ..can you share this ppt??😊
share the pdf sir
give code