-
### Description
The NSL-KDD dataset, provided by the University of New Brunswick's Canadian Institute for Cybersecurity, serves as a revised version of the original KDD Cup 1999 dataset. It is exte…
-
Bad documenttaion. not very long errors
Detecting toxicity in outputs generated by Large Language Models (LLMs) is crucial for ensuring that these models produce safe, respectful, and appropriate con…
-
WDYT? Is this publication in scope?
```
@article{Chih_Hsu_Yen_2006,
author = {Chih-Hsu Yen and Bing-Fei Wu},
doi = {10.1109/tc.2006.90},
issn = {0018-9340},
journal = {IEEE Transactions on Compute…
-
Here is a short list of nodes and features in order to expand the capabilities of KabelSalat.
# Ugens
## **Attenuation / Amplification**
- [ ] Low Pass Gate
- [ ] Amplitude scaling
- [x]…
-
Strengthen the log detection of domain control, and recommend you a https://github.com/Qihoo360/WatchAD2.0 item
There are domain-related attack detections here, and I hope the next version of the too…
-
[Graph backdoor](https://www.usenix.org/conference/usenixsecurity21/presentation/xi)
```bib
@inproceedings{xi2021graph,
title={Graph backdoor},
author={Xi, Zhaohan and Pang, Ren and Ji, Shouli…
-
great code only can you share data for Final: Cybersecurity attack detection.
to try and learn it
thanks
-
Hello everyone,
I'm working on a final year project for my school. The project is a simple nginx reverse proxy with modsecurity and behind it a juice shop.
The problem is that modsecurity blocks sql…
-
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmann…
-
Question: With the set of thresholds and contamination parameters taken from plots 2, are we able to detect the attack before the attack is successful?
Objective: To showcase the time gap between t…