Latest version: v1.1.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
This toolbox was developed to provide computational neuroscientists and neuromorphic engineers with a playground for implementing neural algorithms which are simulated using Brian 2.
No known vulnerabilities found