Latest version: v0.0.12
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
This Project uses the calculation of similarities scores of a set of entities in an edge list. To allow for versatile usage, it uses dependency injection to implement it into any application.
No known vulnerabilities found
Has known vulnerabilities