-
Goal:
Apps/workloads:
Metrics:
Graphs:
Key points:
-
I have placed your instruction data into the dataset for the first stage of fine-tuning, but at 27% progress, the loss seems to have become zero, and the loss has been close to zero throughout the pro…
-
Hi im wondering are there any attacks that i can run for Android Malware Detection with Drebin like the tutorial ? It would be helpful if you could show me how to initialize those attacks. I will cit…
-
# Description
Cloudflare Email Security monitors email traffic for various threats including phishing, malware and spam. It provides protection by intercepting and quarantining potentially malicious e…
-
This issue will track the progress of implementing further processing to ECS for the PUA/Sus detection in Windows Defender. This should be parsed similarly to malware detection/quarantine.
1160
```
M…
-
As a small software vendor in today’s "cybersecurity" world, the biggest issue isn’t false positives (FPs) themselves—it’s the lack of response from antivirus vendors and the total lack of accountabil…
-
I'm working on the VM & dataset but I have some questions,
how do I start with the VM, so I can put something in my research as a contribution?
Also how would I adapt this model to work on differen…
-
There has been some discussion and confusion on how to represent a security detection in OCSF. One obvious approach is to use the `Detection Finding` class, however it isn't appropriate for all types…
-
I ran the report and looking at the following part of the report, I'm not sure what to do with the information:
Event/Info | Count
Total Events | 17
Total Objects Flagged | 1
Total Unique Event …
-
I downloaded bsky v0.0.66-0.0.67 from releases on Windows 10.
At that time Windows Defender will block and delete the .zip file.
![スクリーンショット 2024-11-28 10 53 09](https://github.com/user-attachments/…