NLP model and tech for cyber security tasks
☆86Mar 22, 2023Updated 2 years ago
Alternatives and similar repositories for NLP4CyberSecurity
Users that are interested in NLP4CyberSecurity are comparing it to the libraries listed below
Sorting:
- wx☆11Aug 14, 2022Updated 3 years ago
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆208Apr 28, 2023Updated 2 years ago
- Machine Learning in Cybersecurity☆91May 23, 2025Updated 9 months ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- URL phishing detection using Generative Adversarial Network (GAN)☆16Oct 14, 2022Updated 3 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Fuzzing Infrastructure with k8s & cephfs☆12Jul 23, 2020Updated 5 years ago
- 基于神经网络的 PHP webshell检测器,目前有Attention与LSTM两种网络结构,以OPCODE作特征基础☆11Nov 28, 2019Updated 6 years ago
- GPT-3 use cases for Cybersecurity☆53Sep 20, 2023Updated 2 years ago
- ECE 188: Computer Security. Repository for "NLP-based Malware Detection on PDFs". Utilizing NLP techniques & transformer models to perfor…☆32Dec 3, 2022Updated 3 years ago
- Phishing Website detection with Machine Learning. This include flask server, chrome extension and machine learning for phishing website d…☆13Sep 27, 2021Updated 4 years ago
- This is a code reproduction for the paper titled "N-BaIoT—Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders"☆11Apr 22, 2021Updated 4 years ago
- ☆15Jan 20, 2023Updated 3 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Text Generation Using RNNs☆12Dec 15, 2018Updated 7 years ago
- ☆13Feb 18, 2020Updated 6 years ago
- Cyber Code Intelligence (CyberCI)☆14Dec 25, 2020Updated 5 years ago
- Code for the paper - Malicious URL Detection via Pretrained Language Model-Guided Multi-Level Feature Attention Network☆14Nov 25, 2023Updated 2 years ago
- code and data for paper "Automatic Generation and Summarization of Shellcode via Transformer and Dual Learning", which accepted in SANER …☆13May 8, 2022Updated 3 years ago
- ☆13Jun 26, 2022Updated 3 years ago
- ☆21Dec 28, 2024Updated last year
- ☆17Mar 6, 2023Updated 2 years ago
- A Machine Learning Model to classify samples as XSS (Cross Site-Scrtpting)☆31Apr 8, 2023Updated 2 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Jan 19, 2018Updated 8 years ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Fl…☆16Apr 29, 2024Updated last year
- ☆18Jul 17, 2022Updated 3 years ago
- This repository presents the implemetation of a highly optimized Deep Transfer Learning (DTL) and Genetic Algorithm (GA) based intrusion …☆25Nov 16, 2023Updated 2 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- This work aims at using different machine learning techniques in detecting anomalies (including hardware failures, sabotage and cyber-at…☆38Sep 11, 2020Updated 5 years ago
- Open source malware detection program using machine learning algorithms on system call traces.☆21Jan 3, 2018Updated 8 years ago
- All necessary code in order to feed Sysmon data into Recurrent Neural Network☆17Jul 2, 2020Updated 5 years ago
- This project contains datasets for Cross Site Scripting (XSS), SQL, and LDAP injections. The project also contains the Matlab code for cr…☆18Dec 18, 2020Updated 5 years ago
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆22Aug 10, 2023Updated 2 years ago
- Learning Manipulation-Invariant Image Similarity for Detecting Re-Use of Images in Scientific Publications☆21Jun 24, 2021Updated 4 years ago
- IoT networks have become an increasingly valuable target of malicious attacks due to the increased amount of valuable user data they cont…☆27Sep 1, 2022Updated 3 years ago
- A list of public sites that are blocking ChatGPT from crawling☆10Aug 30, 2023Updated 2 years ago
- A data dependence analyzer for C program☆20Jan 23, 2022Updated 4 years ago
- LSTM and MLP for sql injection detection☆26Dec 9, 2018Updated 7 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆24Nov 15, 2024Updated last year