Digital-Innovation-Foundation / CyberOntoLinks
Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, and Countermeasures (CIRC3). We integrate Artificial Intelligence (AI) and Knowledge Graph (KG) tech. to automate CyberSA capabilities.
☆10Updated 3 years ago
Alternatives and similar repositories for CyberOnto
Users that are interested in CyberOnto are comparing it to the libraries listed below
Sorting:
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆65Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆34Updated 2 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆33Updated 10 months ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆51Updated last year
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆21Updated 2 weeks ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 7 months ago
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆39Updated 10 months ago
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- This is a repository to experiment with MCP for security☆45Updated 10 months ago
- ATLAS tactics, techniques, and case studies data☆87Updated 2 weeks ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆25Updated 6 months ago
- ☆25Updated 4 years ago
- GPT-3 use cases for Cybersecurity☆52Updated 2 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆64Updated last year
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Updated 2 months ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66Updated 5 years ago
- OpenCTI datasets☆29Updated last week
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆104Updated last year
- Extracting Attack Behavior from Threat Reports☆79Updated 2 years ago
- ☆75Updated 2 weeks ago
- EPSS(Exploit Prediction Scoring System) API client☆19Updated 3 weeks ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆31Updated 4 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆12Updated 4 years ago