0xyd / sec2vecView external linksLinks
A embedding method for Cyber Threat Intelligence
☆22Dec 2, 2018Updated 7 years ago
Alternatives and similar repositories for sec2vec
Users that are interested in sec2vec are comparing it to the libraries listed below
Sorting:
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- Python utilities☆18May 25, 2025Updated 8 months ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Jul 15, 2020Updated 5 years ago
- A Python function for bootstrapping☆10Nov 5, 2019Updated 6 years ago
- ☆12Aug 15, 2023Updated 2 years ago
- With the rapid adoption of smartphones, tablets, and mobile apps, they are increasingly becoming part of children’s daily life for amusem …☆12Apr 7, 2017Updated 8 years ago
- Earth observations, especially satellite data, have produced a wealth of methods and results in meeting global challenges, often presente…☆12Sep 22, 2022Updated 3 years ago
- AMNN: Attention-based Multimodal Neural Network Model for Hashtag Recommendation☆11Jan 6, 2020Updated 6 years ago
- ☆11Aug 7, 2020Updated 5 years ago
- empow's intent classification plugin☆11Jun 27, 2019Updated 6 years ago
- ☆11May 3, 2019Updated 6 years ago
- ☆10Oct 20, 2022Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- This repository contains code and data for reproducing the experiments of three papers that focus on two subtasks of table annotation: co…☆12Mar 5, 2025Updated 11 months ago
- [Main EMNLP'25] LLMs do Multi-Label Classification Differently☆13Aug 28, 2025Updated 5 months ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- Baseline implementations on the MuMiN dataset☆10Oct 18, 2023Updated 2 years ago
- Streamable HTTP based MCP server and Client demo with auto registry, Dockerfile setup and env.☆19May 30, 2025Updated 8 months ago
- Hierarchical Story Generation based on (https://arxiv.org/abs/1805.04833)☆13May 6, 2020Updated 5 years ago
- ☆10Nov 14, 2025Updated 3 months ago
- Threat hunting in social media☆12Feb 17, 2019Updated 6 years ago
- Dataset for Paper "Exploring Content Selection in Summarization of Novel Chapters"☆14Mar 20, 2023Updated 2 years ago
- Code of "Instruction Multi-Constraint Molecular Generation Using a Teacher-Student Large Language Model"☆14Jul 8, 2025Updated 7 months ago
- ☆13Feb 5, 2024Updated 2 years ago
- The TextWorld KG Dataset from the paper Building Dynamic Knowledge Graphs from Text-based Games☆10Mar 11, 2020Updated 5 years ago
- Repository for UC Santa Cruz's work on Libresoft's CVSAnalY☆15May 13, 2013Updated 12 years ago
- self-hosted local AI platform based on Ollama + Spring AI☆21Dec 23, 2025Updated last month
- JSFlow is a security-enhanced JavaScript interpreter for fine-grained tracking of information flow.☆15May 28, 2021Updated 4 years ago
- ☆13May 24, 2025Updated 8 months ago
- eAudit suite for recording provenance-related system calls on Linux☆17Jan 16, 2026Updated 3 weeks ago
- ☆17May 29, 2025Updated 8 months ago
- A Naive Bayes spam/ham classifier based on Bayes' Theorem. A bunch of emails is first used to train the classifier and then a previously …☆12Jan 16, 2018Updated 8 years ago
- The University of Western Australia's submission to the ICDM 2019 Knowledge Graph Contest.☆13Dec 8, 2022Updated 3 years ago
- Repository to reproduce "Cascade-based Echo Chamber Detection" accepted at CIKM2022☆11Mar 13, 2024Updated last year
- Named entity recognition system using multi-stage CRF and statistical rules☆12Oct 3, 2016Updated 9 years ago
- Story understanding and plot analysis pilot.☆11Dec 27, 2022Updated 3 years ago
- ☆11Nov 23, 2024Updated last year
- ☆12Jun 3, 2019Updated 6 years ago
- Dataset for the investigation of visual semiotics, and how specific visual features and design choices can elicit specific emotions, thou…☆10Dec 13, 2023Updated 2 years ago