-
**Objective:**
The primary goal of this project is to develop a robust system for detecting cyber attacks using advanced machine learning techniques, including Logistic Regression, Multilayer Percep…
-
In today's digital age, cybersecurity plays a crucial role in safeguarding our online world. With the increasing reliance on digital information and systems, it is more important than ever to understa…
-
Hi,
Good job.
However,some descriptions of attack data are lacking.
Can you provide related details or share your Master's thesis?
Thank you.
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Feature Description
Implementing machine learning algorithms for cyber attack detection involves analyzing net…
-
May I know the title of your paper work? I want to learn more details, Thanks very lot!
I'm also work in this area, and my work concentrates on the detection of PLC attacks, concluding scanning, mali…
-
# 💡 Summary #
Update https://docs.crossfeed.cyber.dhs.gov/
## Motivation and context ##
At this time, the xfd application does not allow custom scanning, but the platform will allow CyHy cust…
-
## Prerequisites
- [x] I read the [Deployment and Setup](https://docs.opencti.io/latest/deployment/overview/) section of the OpenCTI documentation as well as the [Troubleshooting](https://docs.open…
-
See file in below location:
assetutilities\src\assetutilities\tests\test_data\word_utilities
Search for text ex: "LNGC":
The output should be
3 times
1 : page 1, Section?
2: page 2, Section?…
-
![image](https://user-images.githubusercontent.com/60084078/209737152-fe6999b0-7d50-4d47-aa51-b965b7e2da9a.png)
-
- [ ] Come up with 5 most important tests to have in system by Tue EOD
- [ ] Reasoning why you are picking these 5 by Tue EOD
- [ ] Implemetation of these 5 actions by Wed EOD