NLP model and tech for cyber security tasks
☆86Mar 22, 2023Updated 3 years ago
Alternatives and similar repositories for NLP4CyberSecurity
Users that are interested in NLP4CyberSecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI driven Web Application Firewall☆32Dec 12, 2022Updated 3 years ago
- wx☆11Aug 14, 2022Updated 3 years ago
- Machine Learning in Cybersecurity☆91May 23, 2025Updated 10 months ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆207Apr 28, 2023Updated 2 years ago
- ☆14Jun 26, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- ☆12Feb 18, 2020Updated 6 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆12Apr 22, 2021Updated 4 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago
- This project contains datasets for Cross Site Scripting (XSS), SQL, and LDAP injections. The project also contains the Matlab code for cr…☆19Dec 18, 2020Updated 5 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆33Dec 3, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- End to End Malicious URL Detection Project using Machine learning and deep learning☆27Apr 25, 2023Updated 2 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Due to the increasingly development of network technology recently, there are various cyber-attacks posed the huge threats to different …☆30Oct 30, 2018Updated 7 years ago
- An Intrusion Detection System based on Deep Belief Networks☆92Oct 27, 2022Updated 3 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- Implementations of 3 phishing detection and identification baselines☆21Nov 25, 2024Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Cyber Attack Detection thanks to Machine Learning Algorithms☆107Jan 20, 2020Updated 6 years ago
- Distributed intelligent malicious traffic detection system based on GAN☆18Apr 8, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Code for the paper URLNet - Learning a URL Representation with Deep Learning for Malicious URL Detection☆176Jan 12, 2021Updated 5 years ago
- Implementation of the ACL Findings paper "OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack"☆10May 24, 2021Updated 4 years ago
- Code for intrusion detection system (IDS) development using CNN models and transfer learning☆200Apr 21, 2023Updated 2 years ago
- My graduation project☆10Feb 16, 2022Updated 4 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Code for Paper : Efficient-CNN-BiLSTM-for-Network-IDS☆123Oct 25, 2022Updated 3 years ago
- A project from EECS6414M of Winter 2020 at York University☆11Mar 26, 2020Updated 6 years ago
- Detecting malicious URLs using Machine Learning☆29Oct 30, 2018Updated 7 years ago
- ☆13Aug 7, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python-based JA3 Generation Server☆13Mar 29, 2020Updated 6 years ago
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago
- Access Control List for Tornado (or just plain Python)☆29Sep 4, 2012Updated 13 years ago
- ☆30Feb 9, 2022Updated 4 years ago
- GPT-3 use cases for Cybersecurity☆54Sep 20, 2023Updated 2 years ago
- As society and technology develop, more and more of our time is spent online, from shopping to socialising, working to banking. Ensuring …☆10Oct 8, 2022Updated 3 years ago
- ☆23Jan 4, 2021Updated 5 years ago