-
## Use case
Currently Organizations / Threat Actor Groups and Individuals / Threat Actor Individuals are tracked as different entities. This leads to inconsistencies due to the fact that they can hav…
-
Hi Everyone,
We are trying to add some threats to the Pytm sources. We are trying to figure out which categories to use for the threats. The categories are causing use trouble.
Here are some exa…
-
Implement support for threat multiplier and AP based threat bonus for spells.
- Higher ranks are now automatically filled when not listed in spell_threat
- Added some loading checks to detect inconsis…
-
The primary goal is to detect anomalies in network traffic data by leveraging the sequential learning capabilities of LSTM networks, enhanced by the bidirectional processing of BiLSTM.
It is handy fo…
-
#### Project link
https://github.com/orgs/geneontology/projects/223
#### Project description
The purpose of this project is to:
- align the pathways widget version in use across the GO (i.…
-
Hey,
In the context of the PROTECT project, we defined a list of exemptions to GDPR’s data subject rights. We welcome discussions with experts in law.
The concepts we are proposing to add to DPV…
-
I made a simple system model to test the risk-report algorithm and have found a bug in the Java attack path code.
The model is "small-uncontrolled" ([small-uncontrolled 2024-05-19T11_41.nq.gz](http…
-
### Goal, if I want to generate json from yaml format configuration
https://github.com/elastic/integrations/tree/main/packages/panw/data_stream/panos/elasticsearch/ingest_pipeline
`yq eval -o=…
-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
xvnpw updated
3 weeks ago
-
**The Problem.**
There are several existing projects in GitHub that aggregate several sources to come up with a list of Command and Control Servers. This IP Address, are useful to be integrated into…