Digital-Innovation-Foundation / CyberOntoLinks
Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, and Countermeasures (CIRC3). We integrate Artificial Intelligence (AI) and Knowledge Graph (KG) tech. to automate CyberSA capabilities.
☆10Updated 3 years ago
Alternatives and similar repositories for CyberOnto
Users that are interested in CyberOnto are comparing it to the libraries listed below
Sorting:
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆66Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆41Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Updated last year
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Updated 3 years ago
- A compiler for the Meta Attack Language☆15Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- ATLAS tactics, techniques, and case studies data☆96Updated 3 weeks ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆27Updated 2 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Updated 9 months ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆36Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- ☆79Updated 2 months ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Updated last month
- Import Mitre Att&ck into Neo4j database☆39Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated last year
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- Extracting Attack Behavior from Threat Reports☆81Updated 2 years ago
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Updated last year
- This is a repository to experiment with MCP for security☆45Updated 11 months ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Updated 6 years ago
- This Repository holds the pcap and Snort rules used for generating the dataset used in my paper: "Deterministic Dendritic Cell Algorithm …☆20Updated 6 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆110Updated last year
- Explore AI Supply Chain Risk with the AI Risk Database☆65Updated last year
- ☆31Updated 11 months ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66Updated 5 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Updated last year
- GPT-3 use cases for Cybersecurity☆53Updated 2 years ago