Digital-Innovation-Foundation / CyberOntoLinks
Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, and Countermeasures (CIRC3). We integrate Artificial Intelligence (AI) and Knowledge Graph (KG) tech. to automate CyberSA capabilities.
☆10Updated 3 years ago
Alternatives and similar repositories for CyberOnto
Users that are interested in CyberOnto are comparing it to the libraries listed below
Sorting:
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆51Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆65Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆39Updated 11 months ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Updated 3 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 11 months ago
- EPSS(Exploit Prediction Scoring System) API client☆19Updated last month
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆30Updated 11 months ago
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- ATLAS tactics, techniques, and case studies data☆91Updated this week
- This is a repository to experiment with MCP for security☆45Updated 11 months ago
- Short deep dive into Threat Hunting on AWS☆15Updated 2 years ago
- ☆25Updated 4 years ago
- ☆77Updated last month
- Extracting Attack Behavior from Threat Reports☆80Updated 2 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 8 months ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆104Updated 6 months ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Updated last year
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆53Updated last week
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Updated last week
- Security Control Knowledge Graph☆31Updated last year
- Graphs in Cybersecurity - Bloodhound☆19Updated last year
- This is a dataset intended to train a LLM model for a completely CVE focused input and output.☆65Updated 6 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆65Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆204Updated 2 years ago