version 2 of the Unified Cybersecurity Ontology
☆16May 7, 2017Updated 8 years ago
Alternatives and similar repositories for uco2
Users that are interested in uco2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- This repository is for development of the Unified Cyber Ontology.☆109Updated this week
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An implementation of BERT for cybersecurity named entity recognition☆26Nov 13, 2020Updated 5 years ago
- GitHub action that validates the syntax of selected RDF files in the repository☆12Feb 12, 2024Updated 2 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 6 months ago
- ☆89Jan 4, 2023Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆43Jul 11, 2023Updated 2 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Slides from my PhD thesis defense at MIT CSAIL, October 2018☆10Mar 4, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- ☆44Apr 29, 2020Updated 5 years ago
- Loads STIX-2 into Neo4j☆26Jul 11, 2020Updated 5 years ago
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 5 months ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- Alibaba Cloud Credentials for Go☆16Mar 14, 2026Updated last month
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆14Feb 20, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- 将pdf分成彩色和黑白部分,便于打印☆11Mar 9, 2025Updated last year
- ☆10Jan 21, 2019Updated 7 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- 健康码演示仅用自娱自乐,演示用途,请勿用于非法,违法,犯罪,后果自负,本软件不承担任何法律责任! 粤康码演示软件使用请点击: https://yuekma.github.io. 一.粤康码破解 三.辽事通破解 四.龙江健康码破解 五.山西省健康码破解 六.随申码破解 七.北…☆18Jun 24, 2022Updated 3 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- Red Team Ethics, resources and more☆17Feb 9, 2020Updated 6 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ACT documentation repo☆17May 22, 2024Updated last year
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- ☆19Jun 29, 2025Updated 9 months ago
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- This POC package tries to filter "malicious" calls in R expressions based on a blacklist to let shared R instances be safe from f…☆29Jul 27, 2014Updated 11 years ago