CyBERT-our-data / config.json
Anonymous
Upload folder using huggingface_hub
162e8ec
{
"_name_or_path": "SynamicTechnologies/CYBERT",
"architectures": [
"RobertaForTokenClassification"
],
"attention_probs_dropout_prob": 0.1,
"bos_token_id": 0,
"classifier_dropout": null,
"eos_token_id": 2,
"finetuning_task": "ner",
"hidden_act": "gelu",
"hidden_dropout_prob": 0.1,
"hidden_size": 768,
"id2label": {
"0": "B-ATTACK_MOTIVATION",
"1": "B-ATTACK_PATTERN",
"2": "B-ATTACK_RESOURCE_LEVEL",
"3": "B-ATTACK_SOPHISTICATION_LEVEL",
"4": "B-ATTACK_TOOL",
"5": "B-CAMPAIGN",
"6": "B-COURSE_OF_ACTION",
"7": "B-GENERAL_IDENTITY",
"8": "B-GENERAL_TOOL",
"9": "B-IMPACT",
"10": "B-INDICATOR",
"11": "B-INFRASTRUCTURE",
"12": "B-INTRUSION_SET",
"13": "B-LOCATION",
"14": "B-MALWARE",
"15": "B-MALWARE_ANALYSIS",
"16": "B-OBSERVED_DATA",
"17": "B-THREAT_ACTOR",
"18": "B-VICTIM_IDENTITY",
"19": "B-VULNERABILITY",
"20": "I-ATTACK_MOTIVATION",
"21": "I-ATTACK_PATTERN",
"22": "I-ATTACK_RESOURCE_LEVEL",
"23": "I-ATTACK_SOPHISTICATION_LEVEL",
"24": "I-ATTACK_TOOL",
"25": "I-CAMPAIGN",
"26": "I-COURSE_OF_ACTION",
"27": "I-GENERAL_IDENTITY",
"28": "I-GENERAL_TOOL",
"29": "I-IMPACT",
"30": "I-INDICATOR",
"31": "I-INFRASTRUCTURE",
"32": "I-INTRUSION_SET",
"33": "I-LOCATION",
"34": "I-MALWARE",
"35": "I-MALWARE_ANALYSIS",
"36": "I-OBSERVED_DATA",
"37": "I-THREAT_ACTOR",
"38": "I-VICTIM_IDENTITY",
"39": "I-VULNERABILITY",
"40": "O"
},
"initializer_range": 0.02,
"intermediate_size": 3072,
"label2id": {
"B-ATTACK_MOTIVATION": 0,
"B-ATTACK_PATTERN": 1,
"B-ATTACK_RESOURCE_LEVEL": 2,
"B-ATTACK_SOPHISTICATION_LEVEL": 3,
"B-ATTACK_TOOL": 4,
"B-CAMPAIGN": 5,
"B-COURSE_OF_ACTION": 6,
"B-GENERAL_IDENTITY": 7,
"B-GENERAL_TOOL": 8,
"B-IMPACT": 9,
"B-INDICATOR": 10,
"B-INFRASTRUCTURE": 11,
"B-INTRUSION_SET": 12,
"B-LOCATION": 13,
"B-MALWARE": 14,
"B-MALWARE_ANALYSIS": 15,
"B-OBSERVED_DATA": 16,
"B-THREAT_ACTOR": 17,
"B-VICTIM_IDENTITY": 18,
"B-VULNERABILITY": 19,
"I-ATTACK_MOTIVATION": 20,
"I-ATTACK_PATTERN": 21,
"I-ATTACK_RESOURCE_LEVEL": 22,
"I-ATTACK_SOPHISTICATION_LEVEL": 23,
"I-ATTACK_TOOL": 24,
"I-CAMPAIGN": 25,
"I-COURSE_OF_ACTION": 26,
"I-GENERAL_IDENTITY": 27,
"I-GENERAL_TOOL": 28,
"I-IMPACT": 29,
"I-INDICATOR": 30,
"I-INFRASTRUCTURE": 31,
"I-INTRUSION_SET": 32,
"I-LOCATION": 33,
"I-MALWARE": 34,
"I-MALWARE_ANALYSIS": 35,
"I-OBSERVED_DATA": 36,
"I-THREAT_ACTOR": 37,
"I-VICTIM_IDENTITY": 38,
"I-VULNERABILITY": 39,
"O": 40
},
"layer_norm_eps": 1e-12,
"max_position_embeddings": 514,
"model_type": "roberta",
"num_attention_heads": 12,
"num_hidden_layers": 6,
"pad_token_id": 1,
"position_embedding_type": "absolute",
"torch_dtype": "float32",
"transformers_version": "4.36.0.dev0",
"type_vocab_size": 1,
"use_cache": true,
"vocab_size": 52000
}