Digital-Innovation-Foundation / CyberOntoLinks
Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, and Countermeasures (CIRC3). We integrate Artificial Intelligence (AI) and Knowledge Graph (KG) tech. to automate CyberSA capabilities.
☆10Updated 3 years ago
Alternatives and similar repositories for CyberOnto
Users that are interested in CyberOnto are comparing it to the libraries listed below
Sorting:
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆65Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Updated 3 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆34Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆26Updated 2 years ago
- ATLAS tactics, techniques, and case studies data☆85Updated 2 weeks ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆50Updated last year
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆67Updated 2 years ago
- Security Control Knowledge Graph☆30Updated last year
- 🤖 A GitHub action that leverages fabric patterns through an agent-based approach☆32Updated 9 months ago
- Explore AI Supply Chain Risk with the AI Risk Database☆63Updated last year
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆37Updated 6 months ago
- CyberBench: A Multi-Task Cyber LLM Benchmark☆23Updated 6 months ago
- EPSS(Exploit Prediction Scoring System) API client☆19Updated last week
- ☆25Updated 4 years ago
- ChatCVE is an app using the Langchain SQL Language Tool to give a LLM prompt experience to CVE and SBOM DevSecOps Triage Data☆22Updated last month
- Extracting Attack Behavior from Threat Reports☆78Updated 2 years ago
- This repository hosts community contributed Kestrel analytics☆18Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66Updated 5 years ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆20Updated 2 weeks ago
- Import Mitre Att&ck into Neo4j database☆37Updated 2 years ago
- This use case aims to leverage stream reasoning techniques and the concept of semantic importance to detect one attacking type of the ins…☆22Updated 8 years ago
- ☆19Updated 5 years ago
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆25Updated 9 months ago
- GridAttackAnalyzer: Smart Grid Attack Analysis Framework☆21Updated 3 years ago
- Secure Jupyter Notebooks and Experimentation Environment☆84Updated 8 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 8 months ago
- ☆15Updated 8 years ago
- All about llm-agents security,attack,vulnerabilities and how to do them for cybersecurity.☆31Updated 9 months ago