ndionysus / multitask-cyberthreat-detectionView external linksLinks
This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twitter using Multi-Task Learning" to be presented at IJCNN 2020.
☆17Sep 14, 2021Updated 4 years ago
Alternatives and similar repositories for multitask-cyberthreat-detection
Users that are interested in multitask-cyberthreat-detection are comparing it to the libraries listed below
Sorting:
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Jul 15, 2020Updated 5 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- annotated dataset of cyber-security related tweets☆22May 10, 2021Updated 4 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Aug 14, 2019Updated 6 years ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- Collect paper metadata and abstract.☆16Feb 8, 2026Updated last week
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- 极验验证码☆11Sep 20, 2018Updated 7 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- pySCM: The Set Covering Machine in Python☆14Apr 18, 2025Updated 9 months ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- ☆12May 19, 2021Updated 4 years ago
- Retrieve papers from DBLP based on CCF ranting☆11Dec 9, 2025Updated 2 months ago
- ☆44Apr 29, 2020Updated 5 years ago
- A more generic version of https://github.com/dataarts/armsglobe for visualizing source/destination data☆10Jul 5, 2016Updated 9 years ago
- Deep-HOSeq: Deep Higher-Order Sequence Fusion for Multimodal Sentiment Analysis.☆11Oct 19, 2020Updated 5 years ago
- Research code and scripts used in the Silburt et al. (2021) EMNLP 2021 paper 'FANATIC: FAst Noise-Aware TopIc Clustering'☆11Jul 6, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- from github.com/zllrunning/face-parsing.PyTorch☆11Oct 5, 2021Updated 4 years ago
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Threat hunting in social media☆12Feb 17, 2019Updated 6 years ago
- SoapySDR Red Pitaya module☆10Oct 9, 2025Updated 4 months ago
- ☆11Dec 26, 2019Updated 6 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago