Cybersecurity Threat Detection Transformer Models
Tools and models for detecting security threats including malware, vulnerabilities, intrusions, and network attacks using transformer-based NLP and ML approaches. Does NOT include general cybersecurity frameworks, vulnerability databases, or non-ML security tools.
There are 15 cybersecurity threat detection models tracked. The highest-rated is koudounasalkis/PoliToHFI-SemEval2023-Task6 at 30/100 with 6 stars.
Get all 15 projects as JSON
curl "https://pt-edge.onrender.com/api/v1/datasets/quality?domain=transformers&subcategory=cybersecurity-threat-detection&limit=20"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
| # | Model | Score | Tier |
|---|---|---|---|
| 1 |
koudounasalkis/PoliToHFI-SemEval2023-Task6
This repository contains the code for the paper "PoliToHFI at SemEval-2023 Task 6" |
|
Emerging |
| 2 |
bayer-science-for-a-better-life/data2text-bioleaflets
Biomedical Data-to-Text Generation via Fine-Tuning Transformers |
|
Experimental |
| 3 |
mohan-gupta/shell-protect-against-cyber-threats
Finding the source code hidden in the text. |
|
Experimental |
| 4 |
Vext-Labs-Inc/vext-pentest-7b
Open-source 7B language model for autonomous penetration testing — parses... |
|
Experimental |
| 5 |
rdpahalavan/nids-transformers
Tag Generation and Text Generation Inference for Network Packets using Transformers |
|
Experimental |
| 6 |
alazkiyai09/privacy-preserving-phishing-detection
Federated phishing detection system using collaborative ML for enhanced... |
|
Experimental |
| 7 |
yashjakhotiya/Adversarial-Attacks-On-Transformers
Exploring vulnerabilities of Transformers-based Malware Detectors to... |
|
Experimental |
| 8 |
akash13singh/resilient_nlp
MockingBERT: Making Transformer Models Resilient to Adversarial Misspellings |
|
Experimental |
| 9 |
shahariar-shibli/Effectiveness-of-Transformer-Models-on-IoT-Security-Detection-in-StackOverflow-Discussions
Effectiveness of Transformer Models on IoT Security Detection in... |
|
Experimental |
| 10 |
spignelon/TrustLink_CyberHackathon
TrustLink: Detect and safeguard against deceptive URLs. Real-time threat... |
|
Experimental |
| 11 |
AmitAK1/Neural-Vulnerability-Scanner
CodeBERT + LoRA fine-tuning for C/C++ vulnerability detection | F1 = 74.3% |... |
|
Experimental |
| 12 |
RenatoMignone/attack-tactic-recognition-nlp
Natural Language Processing (NLP) approach for cybersecurity command... |
|
Experimental |
| 13 |
gayatriiv/novelty-detector
transformer-based NLP system to detect semantic contradictions and novelty... |
|
Experimental |
| 14 |
RenatoMignone/AI-Driven-Threat-Detection-Research
AI-Driven Threat Detection Research A defense suite leveraging FFNNs, GNNs,... |
|
Experimental |
| 15 |
extremecoder-rgb/Null-Detector
Null Result Detection GNN System - A graph neural network (GNN) system... |
|
Experimental |