A embedding method for Cyber Threat Intelligence
☆22Dec 2, 2018Updated 7 years ago
Alternatives and similar repositories for sec2vec
Users that are interested in sec2vec are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Python code to automatically produce a summary of a piece of text.☆12Sep 8, 2016Updated 9 years ago
- ☆11May 3, 2019Updated 7 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您 有所帮助~☆10Apr 21, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Aug 15, 2023Updated 2 years ago
- Scripts involved in getting data for ingredient substitutions☆16Feb 14, 2023Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- ☆18Apr 29, 2026Updated last week
- Official implementation of "FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination"☆10Apr 17, 2024Updated 2 years ago
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated 11 months ago
- Code and data for automatic paraphrase dataset augmentation.☆11Mar 8, 2021Updated 5 years ago
- Code of "Instruction Multi-Constraint Molecular Generation Using a Teacher-Student Large Language Model"☆14Jul 8, 2025Updated 10 months ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Mapping Echo Chambers In Large Networks☆11Nov 8, 2024Updated last year
- Baseline implementations on the MuMiN dataset☆10Oct 18, 2023Updated 2 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Public Arena dataset☆15Jul 20, 2022Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 3 months ago
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- Hierarchical Story Generation based on (https://arxiv.org/abs/1805.04833)☆13May 6, 2020Updated 6 years ago
- M2GNN☆13Apr 16, 2023Updated 3 years ago
- Source code and data of our paper "Missing Counter-Evidence Renders NLP Fact-Checking Unrealistic for Misinformation" (https://arxiv.org/…☆10Jun 21, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- [COLING 2022]: CommunityLM: Probing Partisan Worldviews from Language Models☆15Jan 31, 2023Updated 3 years ago
- A Python function for bootstrapping☆10Nov 5, 2019Updated 6 years ago
- Capsule Routing for Named Entity Recognition☆10Dec 22, 2020Updated 5 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- ☆15Nov 3, 2022Updated 3 years ago
- Yet another Facebook clone written in C☆10Mar 5, 2025Updated last year
- Code & data for IJCAI'22 paper "Recipe2Vec: Multi-modal Recipe Representation Learning with Graph Neural Networks".☆14Jul 24, 2022Updated 3 years ago
- With the rapid adoption of smartphones, tablets, and mobile apps, they are increasingly becoming part of children’s daily life for amusem…☆12Apr 7, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13Jun 20, 2024Updated last year
- code and link to the dataset for Kenyan Food detection paper accepted as a paper in MADiMA 2019 Workshop as part of ACM MM 2019 conferenc…☆11Aug 6, 2024Updated last year
- Threat hunting in social media☆12Feb 17, 2019Updated 7 years ago
- Named entity recognition system using multi-stage CRF and statistical rules☆12Oct 3, 2016Updated 9 years ago
- ☆11Aug 7, 2020Updated 5 years ago
- Dataset for the investigation of visual semiotics, and how specific visual features and design choices can elicit specific emotions, thou…☆10Dec 13, 2023Updated 2 years ago
- Earth observations, especially satellite data, have produced a wealth of methods and results in meeting global challenges, often presente…☆12Sep 22, 2022Updated 3 years ago