├── A_Deeper_Analysis_of_Adversarial_Examples_in_Intrusion_Detection └── NSL-KDD.ipynb └── Investigating_the_Practicality_of_Adversarial_Evasion_Attacks_on_Network_Intrusion_Detection ├── CIDDS-001.ipynb ├── NSL-KDD.ipynb └── UNSW-NB15.ipynb /A_Deeper_Analysis_of_Adversarial_Examples_in_Intrusion_Detection/NSL-KDD.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mamerzouk/adversarial_analysis/HEAD/A_Deeper_Analysis_of_Adversarial_Examples_in_Intrusion_Detection/NSL-KDD.ipynb -------------------------------------------------------------------------------- /Investigating_the_Practicality_of_Adversarial_Evasion_Attacks_on_Network_Intrusion_Detection/CIDDS-001.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mamerzouk/adversarial_analysis/HEAD/Investigating_the_Practicality_of_Adversarial_Evasion_Attacks_on_Network_Intrusion_Detection/CIDDS-001.ipynb -------------------------------------------------------------------------------- /Investigating_the_Practicality_of_Adversarial_Evasion_Attacks_on_Network_Intrusion_Detection/NSL-KDD.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mamerzouk/adversarial_analysis/HEAD/Investigating_the_Practicality_of_Adversarial_Evasion_Attacks_on_Network_Intrusion_Detection/NSL-KDD.ipynb -------------------------------------------------------------------------------- /Investigating_the_Practicality_of_Adversarial_Evasion_Attacks_on_Network_Intrusion_Detection/UNSW-NB15.ipynb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/mamerzouk/adversarial_analysis/HEAD/Investigating_the_Practicality_of_Adversarial_Evasion_Attacks_on_Network_Intrusion_Detection/UNSW-NB15.ipynb --------------------------------------------------------------------------------