This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" accepted to the IJCNN 2019.
☆31Jul 15, 2020Updated 5 years ago
Alternatives and similar repositories for twitter-cyberthreat-detection
Users that are interested in twitter-cyberthreat-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- annotated dataset of cyber-security related tweets☆22May 10, 2021Updated 4 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Extract cyber security entities from unstructured text☆34Apr 24, 2017Updated 8 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Nov 21, 2022Updated 3 years ago
- Threat hunting in social media☆12Feb 17, 2019Updated 7 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- A embedding method for Cyber Threat Intelligence☆22Dec 2, 2018Updated 7 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- ☆44Apr 29, 2020Updated 5 years ago
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Aug 14, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- ☆26Dec 7, 2019Updated 6 years ago
- ☆49Mar 1, 2022Updated 4 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆118May 27, 2023Updated 2 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆41Apr 5, 2022Updated 4 years ago
- ☆11May 3, 2019Updated 6 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Android大作业——仿知乎日报☆11Sep 14, 2017Updated 8 years ago
- Neural Processing Letters: End-to-End Entity Detection with Proposer and Regressor☆12Jun 6, 2023Updated 2 years ago
- 该资源为安全相关的数据集,包括恶意URL、恶意流量、图像分类、恶意软件等,希望对您有所帮助~☆10Apr 21, 2021Updated 4 years ago
- This script extracts the reviews from a given app store, it uses non-specific CSS selectors to prevent malfunctions in the future.☆10Oct 19, 2019Updated 6 years ago
- ☆12Nov 11, 2022Updated 3 years ago
- ☆10Aug 22, 2023Updated 2 years ago
- Repo containing documentation and explanation for CSET's harm taxonomy of incidents from AIID.☆19Jun 21, 2024Updated last year
- Codes for our paper "Enhancing Continual Relation Extraction via Classifier Decomposition" (Findings of ACL2023)☆10Nov 29, 2023Updated 2 years ago
- 基于MFC的远程控制项目☆10Jun 26, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆223Apr 30, 2024Updated last year
- Python scripts to scrape the iTunes Podcast categories.☆12Nov 30, 2020Updated 5 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- In this notebook, I am updating NLP notebooks, and projects☆10Jun 29, 2023Updated 2 years ago
- ☆18Updated this week
- Official implementation of "FastLogAD: Log Anomaly Detection with Mask-Guided Pseudo Anomaly Generation and Discrimination"☆10Apr 17, 2024Updated 2 years ago