File size: 3,230 Bytes
e0fd43b
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
{
  "_name_or_path": "microsoft/deberta-v3-base",
  "architectures": [
    "DebertaV2ForTokenClassification"
  ],
  "attention_probs_dropout_prob": 0.1,
  "finetuning_task": "ner",
  "hidden_act": "gelu",
  "hidden_dropout_prob": 0.1,
  "hidden_size": 768,
  "id2label": {
    "0": "B-ATTACK_MOTIVATION",
    "1": "B-ATTACK_PATTERN",
    "2": "B-ATTACK_RESOURCE_LEVEL",
    "3": "B-ATTACK_SOPHISTICATION_LEVEL",
    "4": "B-ATTACK_TOOL",
    "5": "B-CAMPAIGN",
    "6": "B-COURSE_OF_ACTION",
    "7": "B-GENERAL_IDENTITY",
    "8": "B-GENERAL_TOOL",
    "9": "B-IMPACT",
    "10": "B-INDICATOR",
    "11": "B-INFRASTRUCTURE",
    "12": "B-INTRUSION_SET",
    "13": "B-LOCATION",
    "14": "B-MALWARE",
    "15": "B-MALWARE_ANALYSIS",
    "16": "B-OBSERVED_DATA",
    "17": "B-THREAT_ACTOR",
    "18": "B-VICTIM_IDENTITY",
    "19": "B-VULNERABILITY",
    "20": "I-ATTACK_MOTIVATION",
    "21": "I-ATTACK_PATTERN",
    "22": "I-ATTACK_RESOURCE_LEVEL",
    "23": "I-ATTACK_SOPHISTICATION_LEVEL",
    "24": "I-ATTACK_TOOL",
    "25": "I-CAMPAIGN",
    "26": "I-COURSE_OF_ACTION",
    "27": "I-GENERAL_IDENTITY",
    "28": "I-GENERAL_TOOL",
    "29": "I-IMPACT",
    "30": "I-INDICATOR",
    "31": "I-INFRASTRUCTURE",
    "32": "I-INTRUSION_SET",
    "33": "I-LOCATION",
    "34": "I-MALWARE",
    "35": "I-MALWARE_ANALYSIS",
    "36": "I-OBSERVED_DATA",
    "37": "I-THREAT_ACTOR",
    "38": "I-VICTIM_IDENTITY",
    "39": "I-VULNERABILITY",
    "40": "O"
  },
  "initializer_range": 0.02,
  "intermediate_size": 3072,
  "label2id": {
    "B-ATTACK_MOTIVATION": 0,
    "B-ATTACK_PATTERN": 1,
    "B-ATTACK_RESOURCE_LEVEL": 2,
    "B-ATTACK_SOPHISTICATION_LEVEL": 3,
    "B-ATTACK_TOOL": 4,
    "B-CAMPAIGN": 5,
    "B-COURSE_OF_ACTION": 6,
    "B-GENERAL_IDENTITY": 7,
    "B-GENERAL_TOOL": 8,
    "B-IMPACT": 9,
    "B-INDICATOR": 10,
    "B-INFRASTRUCTURE": 11,
    "B-INTRUSION_SET": 12,
    "B-LOCATION": 13,
    "B-MALWARE": 14,
    "B-MALWARE_ANALYSIS": 15,
    "B-OBSERVED_DATA": 16,
    "B-THREAT_ACTOR": 17,
    "B-VICTIM_IDENTITY": 18,
    "B-VULNERABILITY": 19,
    "I-ATTACK_MOTIVATION": 20,
    "I-ATTACK_PATTERN": 21,
    "I-ATTACK_RESOURCE_LEVEL": 22,
    "I-ATTACK_SOPHISTICATION_LEVEL": 23,
    "I-ATTACK_TOOL": 24,
    "I-CAMPAIGN": 25,
    "I-COURSE_OF_ACTION": 26,
    "I-GENERAL_IDENTITY": 27,
    "I-GENERAL_TOOL": 28,
    "I-IMPACT": 29,
    "I-INDICATOR": 30,
    "I-INFRASTRUCTURE": 31,
    "I-INTRUSION_SET": 32,
    "I-LOCATION": 33,
    "I-MALWARE": 34,
    "I-MALWARE_ANALYSIS": 35,
    "I-OBSERVED_DATA": 36,
    "I-THREAT_ACTOR": 37,
    "I-VICTIM_IDENTITY": 38,
    "I-VULNERABILITY": 39,
    "O": 40
  },
  "layer_norm_eps": 1e-07,
  "max_position_embeddings": 512,
  "max_relative_positions": -1,
  "model_type": "deberta-v2",
  "norm_rel_ebd": "layer_norm",
  "num_attention_heads": 12,
  "num_hidden_layers": 12,
  "pad_token_id": 0,
  "pooler_dropout": 0,
  "pooler_hidden_act": "gelu",
  "pooler_hidden_size": 768,
  "pos_att_type": [
    "p2c",
    "c2p"
  ],
  "position_biased_input": false,
  "position_buckets": 256,
  "relative_attention": true,
  "share_att_key": true,
  "torch_dtype": "float32",
  "transformers_version": "4.36.0.dev0",
  "type_vocab_size": 0,
  "vocab_size": 128100
}