You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
GCTp provides a structured prompt template for large language models to generate topic-specific comparison or landscape tables. The prompt is customizable, enab…
AMARANTH is a testing framework that evaluates high-TRL AI models for the electric sector under normal and adversarial conditions. Using accelerated simulations…
The HSA is a statistics-based anomaly detection model that uses graph theory to analyze data relationships across time and scale. It works on diverse data types…
This code processes Zeek logs from network packet captures to identify anomalies in traffic patterns, potentially signaling malicious activity. It uses DBSCAN c…
This code detects Living-Off-the-Land attacks by analyzing Zeek logs from network traffic. After preprocessing, it uses K-Means to label devices, applies a Grap…
The purpose of this code is to use Machine Learning to spot unusual patterns in network traffic, which could indicate malicious activity. It does this by applyi…
COREII Scout helps analysts collect and analyze cyber attack data by automating report writing. Using NLP for entity extraction, ACE for classification, and an …
The code includes modules for generating and collecting network traffic data for WIFI networks or a simulated 5G network and tools for training machine learning…
The Tracer Analysis Toolbox (TAT) is a stand-alone executable software package that focuses on reservoir monitoring, using changes in concentration of thermally…
The code fetches an image, places a button behind the image that detects user touch via Unity cues, converts 3D input to pixel space and estimates the correspon…
This simulator performs several critical functions: (1) Calculating time-series power flow every 4 seconds; (2) Updating and dispatching AGC signals every minut…
COREII is a modular cybersecurity research platform that integrates AI, ML, large language models, and advanced analytics to collect, analyze, and correlate dat…
The Verifiable Fuel Cycle Simulation (VISION) is a system-dynamics model of the entire nuclear fuel cycle, from mining to disposal, using user-defined deploymen…
This software allows the user to visualize Wireshark or other network capture logs in a waterfall graphic display that the user can quickly find data that looks…
This is the repository for all code related to the AGN-201 Nuclear Reactor Digital Twin at Idaho State University. The goal of this code repository is to consol…
The IGCAPT allows electric utility personnel to perform a static analysis of their communications network supporting smart grid architectures from a network uti…
Simulation Environment for Radiotherapy Applications (SERA) is a package to help create treatment plans for treating tumors with boron neutron capture therapy. …
IIPG_Fracture is to provide a numerical tool to model crack propagation in brittle solid media by implementing the Incomplete Interior Penalty Galerkin (IIPG) a…
Software is a workflow management system designed to capture documents and route for compliance and peer reviews. Software does not in itself contain any techni…
When developing Asp.Net Core applications for deployment in Linux or Docker environments, applications are no longer able to be configured to use Windows Authen…
The code facilitates running tests and then validating the results. The tests are normally attacks on a system and the verification is normally to validate prot…
This project was funded by DOE BETO to solve a common challenge facing most material recovery facilities (MRF) in order to identify the costs of sorting municip…