- Automatic Labeling for Entity Extraction in Cyber Security: https://arxiv.org/pdf/1308.4941.pdf
- Auto-labeled-corpus: https://github.com/stucco/auto-labeled-corpus
- entity-extractor in Java: https://github.com/stucco/entity-extractor
- Neuro-NER: https://github.com/Franck-Dernoncourt/NeuroNER
- Towards a Relation Extraction Framework for Cyber-Security Concepts: https://arxiv.org/pdf/1504.04317.pdf
- Cyber & Information Security Research Group, Oak Ridge National Laboratory repository: https://github.com/stucco/docs
- Weakly Supervised Extraction of Computer Security Events from Twitter: https://github.com/aritter/twitter_nlp
- Weakly Supervised Extraction of Computer Security Events from Twitter live system: http://kb1.cse.ohio-state.edu:8123/events/hacked
- Machine learning in Cyber security NormShield: https://www.normshield.com/category/uncategorized/
- Malware based cyber ontologies MITRE presentation: https://pdfs.semanticscholar.org/860d/3d4114711fa4ce9a5a4ccf362b80281cc981.pdf
- Malware based cyber ontologies MITRE paper: http://ceur-ws.org/Vol-966/STIDS2012_T06_ObrstEtAl_CyberOntology.pdf
- List of Cyber security Dataset, Paper and talks: https://github.com/jivoi/awesome-ml-for-cybersecurity, https://github.com/wtsxDev/Machine-Learning-for-Cyber-Security
- CVE twitter : https://twitter.com/CVEnew/
- CVE Downloads: https://cve.mitre.org/data/downloads/index.html
- NVD full list: https://nvd.nist.gov/vuln/full-listing
- WOrdToVec google implementation: https://code.google.com/archive/p/word2vec/
- wordtoVec demo : https://www.youtube.com/watch?v=pY9EwZ02sXU, https://github.com/YuriyGuts/thrones2vec, https://github.com/llSourcell/word_vectors_game_of_thrones-LIVE
- RNN deep learning algorithm introduction using python : https://www.analyticsvidhya.com/blog/2017/05/neural-network-from-scratch-in-python-and-r/
- Word embeding algorithm Introduction: https://www.analyticsvidhya.com/blog/2017/06/word-embeddings-count-word2veec/
- API for pretrained NLP dataset like twitter: https://github.com/RaRe-Technologies/gensim-data, https://rare-technologies.com/new-api-for-pretrained-nlp-models-and-datasets-in-gensim/
- Facets Dive Data visulization tool demo: https://rare-technologies.com/interactive-confusion-matrix-python/
- security dataset : https://github.com/hgascon/security-datasets, http://www.secrepo.com,
- LSTM github Project: https://github.com/Hironsan/anago
- BLSTM paper: https://arxiv.org/pdf/1510.06168.pdf
- LSTM blog: http://colah.github.io/posts/2015-08-Understanding-LSTMs/, https://deeplearning4j.org/lstm.html
- Html Content / Article Extractor, web scrapping lib in Python : https://github.com/grangier/python-goose
- Databreach website: https://www.databreaches.net
- OWASP web hacking incident database: https://fusiontables.google.com/DataSource?snapid=S283929Jw2s
- CEH material : http://repo.thehackademy.net/depot_cehv6/
- To fetch the old tweets: https://github.com/Jefferson-Henrique/GetOldTweets-python
- Security Research papers to download for security data: https://arxiv.org/list/cs/pastweek?show=627
- Web Scrapping using Scrapy: https://towardsdatascience.com/using-scrapy-to-build-your-own-dataset-64ea2d7d4673
- List of Security Knowledge source( Article blogs): https://stucco.github.io/data/
- Microsoft Article Dataset: https://docs.microsoft.com/en-us/windows/windows-10/
ShashSec/SMTI_SA
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
Threat hunting in social media
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published