leafage-autumn / Vulnerability_classify
NVD,CNNVD软件漏洞数据集,漏洞文本预处理,训练算法模型进行漏洞分类
☆10Updated 6 years ago
Alternatives and similar repositories for Vulnerability_classify:
Users that are interested in Vulnerability_classify are comparing it to the libraries listed below
- 主要是自己看过的一些论文,同时做了对应的思维导图,以供大家参考学习。☆12Updated 2 years ago
- Vulnerability knowledge graph construction☆20Updated 2 years ago
- network security named entity recognition, Chinese☆11Updated 5 years ago
- ☆18Updated 4 years ago
- ☆16Updated 2 years ago
- 利用知识图谱分析网络安全事件☆40Updated 4 years ago
- 使用Bert做embedding,结合BiLSTM做恶意软件的多分类任务☆42Updated 4 years ago
- CyberAttack Sensing and Information Extraction☆71Updated last month
- The repository of paper "HackMentor: Fine-Tuning Large Language Models for Cybersecurity".☆109Updated 8 months ago
- ☆45Updated 6 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆206Updated 9 months ago
- Public Arena dataset☆12Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆34Updated 7 months ago
- ☆41Updated 4 years ago
- Building relation graph of Android APIs to catch the semantics between APIs, and used to enhancing Android malware detectors☆80Updated 2 years ago
- ☆30Updated 4 years ago
- This is a project source for NER in cybersecurity threat intelligence☆20Updated 2 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆155Updated last year
- DataCon大数据安全分析大赛,2019年方向二(恶意代码检测)冠军源码、2020年方向五(恶意代码分析)季军源码☆104Updated 3 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆59Updated 4 years ago
- Official repository for MalKG☆20Updated 4 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆63Updated 2 years ago
- 使用CodeBERT来webshell classfication☆33Updated 2 years ago
- ☆11Updated 5 years ago
- ☆9Updated 5 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆17Updated last year
- Reproducing state-of-the-art results☆21Updated 2 years ago
- This project aims to consolidate and share high-quality resources and tools across the cybersecurity domain.☆129Updated last month
- ☆22Updated 5 years ago