SecureBERT is a domain-specific language model to represent cybersecurity textual data.
☆114Jul 19, 2024Updated last year
Alternatives and similar repositories for SecureBERT
Users that are interested in SecureBERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆33Jan 26, 2024Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆209Apr 28, 2023Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆118May 27, 2023Updated 2 years ago
- ☆25Dec 10, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆53Sep 14, 2024Updated last year
- ☆24Aug 15, 2020Updated 5 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- Towards an Explainable Artificial Intelligence Framework for Enhancing Explainability in Network Intrusion Detection Systems☆22Nov 30, 2024Updated last year
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 7 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆60Aug 29, 2022Updated 3 years ago
- ☆87Mar 29, 2023Updated 3 years ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- ☆42Feb 18, 2026Updated 3 months ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- A Torrent but for LAN☆14Oct 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆106Apr 22, 2026Updated 3 weeks ago
- ☆40May 14, 2026Updated last week
- ☆48Feb 26, 2024Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆44Nov 10, 2025Updated 6 months ago
- ☆89Jan 4, 2023Updated 3 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆24May 24, 2025Updated 11 months ago
- ☆108Jun 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆38Mar 3, 2023Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆564May 6, 2025Updated last year
- A Python 3 Bandit Visualization Package☆11Oct 16, 2017Updated 8 years ago
- Example project for the BRS-100-GW1NR9 FPGA development board.☆15Updated this week
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆108Nov 9, 2025Updated 6 months ago
- Flow Interaction Graph based attack traffic detection system.☆193May 6, 2024Updated 2 years ago
- OWASP Foundation web repository☆69Apr 10, 2026Updated last month