How to use this model?
#1
by
Alwiin
- opened
Hello,
Thanks for sharing your fine-tuned cybersecurity model.
Would you please help me with how to use this model after importing it?
More specifically, what is the input and output of the model?
Can it provide details about different tactics and techniques if I name a few of them?
Or can it math any incident to the related APT?