SecureBERT is a domain-specific language model to represent cybersecurity textual data.
☆110Jul 19, 2024Updated last year
Alternatives and similar repositories for SecureBERT
Users that are interested in SecureBERT are comparing it to the libraries listed below
Sorting:
- An extended version of SecureBERT, trained on top of both base and large version of RoBERTa using 10 GB cybersecurity-related data☆32Jan 26, 2024Updated 2 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆208Apr 28, 2023Updated 2 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- ☆36Jan 27, 2026Updated last month
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- ☆24Aug 15, 2020Updated 5 years ago
- Source code of "TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification", ACL2024 (findings)☆14Nov 20, 2024Updated last year
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- 当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~☆19May 20, 2024Updated last year
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- This approach of Intrusion Detection uses two GPT models, which are trained on normal network traffic, to predict sequences of communicat…☆11Oct 3, 2023Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆27Apr 12, 2024Updated last year
- Usenix Security'23☆16Feb 14, 2023Updated 3 years ago
- ☆14Feb 11, 2022Updated 4 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- ☆86Mar 29, 2023Updated 2 years ago
- An implementation of BERT for cybersecurity named entity recognition☆26Nov 13, 2020Updated 5 years ago
- ☆41Feb 18, 2026Updated last month
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEs☆20May 26, 2023Updated 2 years ago
- ☆36Feb 26, 2026Updated 3 weeks ago
- @DisCo is a graph based datastore designed to minimize reverse engineering efforts.☆12Jan 21, 2021Updated 5 years ago
- A Torrent but for LAN☆14Oct 27, 2024Updated last year
- Book Introduction Page☆19Aug 10, 2023Updated 2 years ago
- ☆44Feb 26, 2024Updated 2 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- ☆59Sep 25, 2025Updated 5 months ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- This repository contains the source code for LiM, a network traffic classification model presented at The Web Conference (WWW 2025).☆22May 24, 2025Updated 9 months ago
- ☆89Jan 4, 2023Updated 3 years ago
- ☆108Jun 2, 2024Updated last year
- Code for the paper "Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer Models"☆36Mar 3, 2023Updated 3 years ago
- ☆57Oct 4, 2024Updated last year
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Example project for the BRS-100-GW1NR9 FPGA development board.☆14Feb 14, 2026Updated last month
- DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing☆15Feb 27, 2023Updated 3 years ago
- The code of "Relation-Guided Few-Shot Relational Triple Extraction", SIGIR 2022.☆13Jul 9, 2022Updated 3 years ago
- MLX Implementation of Recursive Reasoning with Tiny Networks☆79Oct 11, 2025Updated 5 months ago