SecureBERT is a domain-specific language model to represent cybersecurity textual data.
☆112Jul 19, 2024Updated last year
Alternatives and similar repositories for SecureBERT
Users that are interested in SecureBERT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆33Jan 26, 2024Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆209Apr 28, 2023Updated 3 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆118May 27, 2023Updated 2 years ago
- ☆25Dec 10, 2022Updated 3 years ago
- ☆36Jan 27, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆54Sep 14, 2024Updated last year
- ☆25Aug 15, 2020Updated 5 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- 当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~☆19May 20, 2024Updated last year
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- Used HTTP CSIC 2010 dataset☆11May 2, 2019Updated 7 years ago
- GNN4ID: A Toolset for Crafting Graph Neural Network-Based NIDS Datasets☆31Feb 23, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- Usenix Security'23☆15Feb 14, 2023Updated 3 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆29Apr 12, 2024Updated 2 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- ☆87Mar 29, 2023Updated 3 years ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- ☆42Feb 18, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Automatic Malware Signature Generation Tool☆15Oct 13, 2021Updated 4 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- ☆46Feb 26, 2024Updated 2 years ago
- ☆59Sep 25, 2025Updated 7 months ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Nov 10, 2025Updated 5 months ago
- The Unified Multimodal NIDS Dataset Tool performs the standardization of network intrusion detection datasets by extracting comprehensive…☆16Jan 22, 2025Updated last year
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 7 years ago
- ☆108Jun 2, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆561May 6, 2025Updated 11 months ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- ☆57Oct 4, 2024Updated last year
- The code of "Relation-Guided Few-Shot Relational Triple Extraction", SIGIR 2022.☆13Jul 9, 2022Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆106Nov 9, 2025Updated 5 months ago
- Flow Interaction Graph based attack traffic detection system.☆193May 6, 2024Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago