-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
xvnpw updated
3 weeks ago
-
The primary goal is to detect anomalies in network traffic data by leveraging the sequential learning capabilities of LSTM networks, enhanced by the bidirectional processing of BiLSTM.
It is handy fo…
-
Hey,
In the context of the PROTECT project, we defined a list of exemptions to GDPR’s data subject rights. We welcome discussions with experts in law.
The concepts we are proposing to add to DPV…
-
I made a simple system model to test the risk-report algorithm and have found a bug in the Java attack path code.
The model is "small-uncontrolled" ([small-uncontrolled 2024-05-19T11_41.nq.gz](http…
-
### Goal, if I want to generate json from yaml format configuration
https://github.com/elastic/integrations/tree/main/packages/panw/data_stream/panos/elasticsearch/ingest_pipeline
`yq eval -o=…
-
**Describe the bug:**
- Filter in does not work properly for non-ECS fields
**Kibana/Elasticsearch Stack version:**
- 8.3.0 (main 58bc0f759e8de873bac9e9fa4607a0b2befa420d)
**Initial Setup:**
…
-
### Question
Hello Apache ShenYu Community,
I'm interested in exploring the possibility of adding an AI plugin to the ShenYu ecosystem. The goal is to leverage artificial intelligence to enhance t…
-
We've added the vt-augment for an internal application, but would like to unblur the attribution. We have an enterprise account license, but don't want create accounts for every user and require that…
-
There is no evidence that moving to the cloud improves security. The distributed architecture offers a multitude of attack vectors. Cloud Deployments create multiple endpoints, each of which needs to …
-
Implement support for threat multiplier and AP based threat bonus for spells.
- Higher ranks are now automatically filled when not listed in spell_threat
- Added some loading checks to detect inconsis…