Unified Cybersecurity Ontology
☆109May 6, 2019Updated 6 years ago
Alternatives and similar repositories for Unified-Cybersecurity-Ontology
Users that are interested in Unified-Cybersecurity-Ontology are comparing it to the libraries listed below
Sorting:
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- Cyber Intelligence Ontology☆56Mar 17, 2017Updated 8 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 5 months ago
- ☆90Jan 4, 2023Updated 3 years ago
- ☆14Mar 2, 2021Updated 5 years ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 9 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- A Semantic LOG ExtRaction Templating (SLOGERT) Approach☆20Nov 27, 2024Updated last year
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,033Dec 19, 2025Updated 2 months ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 5 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆99Updated this week
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 10 months ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆14Jul 26, 2019Updated 6 years ago
- 3d-printed robot with arduino, oled and bluetooth.☆23Nov 26, 2014Updated 11 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆69Feb 17, 2026Updated 2 weeks ago
- Material from the DARPA Transparent Computing Program☆227Apr 29, 2020Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- A specification including, problem statement, use cases, requirements, and architectural constituents for a Transparency Service in suppo…☆14Feb 17, 2023Updated 3 years ago
- ☆33Oct 27, 2016Updated 9 years ago
- Tools to update and export ontology RDF.☆38Dec 30, 2024Updated last year
- GraphChi's C++ version. Big Data - small machine.☆17Nov 29, 2020Updated 5 years ago
- ☆103Nov 26, 2020Updated 5 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- A TUI for Managing and Searching with Meilisearch☆20Aug 26, 2025Updated 6 months ago