Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
☆75Nov 21, 2022Updated 3 years ago
Alternatives and similar repositories for inconsistency_detection
Users that are interested in inconsistency_detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Jul 15, 2020Updated 5 years ago
- Code for "Analyzing the Perceived Severity of Cybersecurity Threats Reported on Social Media".☆25Jul 1, 2019Updated 6 years ago
- A library for parsing security advisories☆13Feb 5, 2026Updated last month
- Extract useful semantic from CVE descriptions usinig NLP☆25Jan 4, 2023Updated 3 years ago
- ☆44Apr 29, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- ☆55Nov 3, 2019Updated 6 years ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- Source-binary patch presence test system.☆27Mar 21, 2020Updated 6 years ago
- Service to scan licenses from source code☆12Aug 14, 2023Updated 2 years ago
- 企业级安全智能化实践☆70Mar 16, 2022Updated 4 years ago
- Graph database version of the CVE database☆26Dec 8, 2022Updated 3 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- Structured Information on State and Evolution of Dockerfiles - Online Appendix☆10Mar 16, 2018Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- scu-ctf平台上题目的Writeup☆13Oct 30, 2023Updated 2 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- CTI database generator and public dataset☆22Jan 12, 2020Updated 6 years ago
- An implementation of BERT for cybersecurity named entity recognition☆26Nov 13, 2020Updated 5 years ago
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- Detecting software vulnerability described public security reports with minimal training examples☆14Jun 11, 2021Updated 4 years ago
- ☆33Jan 28, 2021Updated 5 years ago
- ☆13May 19, 2021Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A cms system for Sichuan University CTF Association☆10Mar 4, 2020Updated 6 years ago
- QEmu backend for avatar²☆22Mar 29, 2025Updated 11 months ago
- A word2vec model trained over Vulners☆16Jan 3, 2022Updated 4 years ago
- ☆43Jun 14, 2022Updated 3 years ago
- LLM for System/Software Security☆24Dec 29, 2024Updated last year
- This repository holds the data, source code and resulting model weights for the paper "Towards end-to-end Cyberthreat Detection from Twit…☆17Sep 14, 2021Updated 4 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- Awesome materials for software supply chain security☆18May 13, 2020Updated 5 years ago
- Tools for conducting analysis of CVE data in Elasticsearch☆74Jul 23, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A PyTorch implementation of the ACM SIGKDD 2021 paper titled "PETGEN: Personalized Text Generation Attack on Deep Sequence Embedding-base…☆17Dec 19, 2023Updated 2 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- [EMNLP2022] Released code for paper "Distilling Causal Effect from Miscellaneous Other-Class for Continual Named Entity Recognition"☆22Feb 9, 2023Updated 3 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- A pure python rpm reader☆20Apr 11, 2024Updated last year
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆223Apr 30, 2024Updated last year
- A Python dependency resolver☆25Mar 2, 2026Updated 3 weeks ago