Hugging Face's logo Hugging Face
  • Models
  • Datasets
  • Spaces
  • Docs
  • Enterprise
  • Pricing

  • Log In
  • Sign Up
Ash-sids 's Collections
CyberSecurity
Model.Related
Document-processing

CyberSecurity

updated Oct 29
Upvote
-

  • Running
    9

    Cybersecurity Dashboard

    🔥
    9

    Monitor network traffic and detect anomalies


  • Runtime error
    4

    Intruision Detection System Deep Learning

    🏃
    4

    Simulate and detect network intrusions


  • Running

    Logfiles Analysis

    🏆

    Analyze cattle logs to detect anomalies


  • Sleeping
    2

    Adnt Ml

    🌍
    2

    Anomaly detection in network traffic


  • Sleeping

    ITE

    🔥

    To test whether a SOC stack is a defect/anomaly or not.


  • Sleeping

    Advanced Ai Sandbox

    💬

    Analyze customer churn, detect anomalies, assess sentiment, and generate text


  • Runtime error
    1

    Anamoly Detector

    💻
    1

    Find anomalies in network traffic from PCAP files


  • Running

    Network Anomaly Fixed

    🏆

    Detect and fix network anomalies


  • Sleeping

    AI Based Network Anomaly Detection

    🔥

    AI_Based_Network_Anomaly_Detection


  • Sleeping

    Analisis Logs

    💻

    Analizador de logs


  • Running
    MCP
    2

    Software Anomalies Detector

    🧠
    2

    Detect anomalies in software logs


  • Sleeping
    MCP
    1

    Software Anomalies Detector

    🧠
    1

    Detect anomalies in software logs


  • Sleeping
    1

    Intrusion Detector Model

    👁
    1

    Identify network anomalies using 41 connection features


  • Sleeping

    Intrusion Detection System

    🛡

    Detect and classify IoT network attacks from CSV data

Upvote
-
  • Collection guide
  • Browse collections
Company
TOS Privacy About Jobs
Website
Models Datasets Spaces Pricing Docs