version 2 of the Unified Cybersecurity Ontology
☆16May 7, 2017Updated 8 years ago
Alternatives and similar repositories for uco2
Users that are interested in uco2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- Unified Cybersecurity Ontology☆110May 6, 2019Updated 7 years ago
- This repository is for development of the Unified Cyber Ontology.☆111Apr 10, 2026Updated 3 weeks ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆89Jan 4, 2023Updated 3 years ago
- OWASP Ontology-driven Threat Modelling framework☆43Jul 11, 2023Updated 2 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Slides from my PhD thesis defense at MIT CSAIL, October 2018☆10Mar 4, 2019Updated 7 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- ☆44Apr 29, 2020Updated 6 years ago
- CyberAttack Sensing and Information Extraction☆74Dec 26, 2024Updated last year
- Loads STIX-2 into Neo4j☆26Jul 11, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 5 months ago
- Intrusion Detection System, IDS,Cyberattack Detection,Pytorch,Transformer☆11Oct 17, 2022Updated 3 years ago
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- nexpose python client library☆10Oct 12, 2019Updated 6 years ago
- Python library and command-line interface for inspecting and visualizing RDF models aka ontologies.☆247Mar 7, 2024Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Net Commander supercharges Visual Studio Code for Network Engineers, DevOps Engineers and Solution Architects streamlining everyday workf…☆25Feb 19, 2026Updated 2 months ago
- Code repo for mapping tool that allows users to play with components of composite indexed indicator, such as social vulnerability.☆12Dec 3, 2022Updated 3 years ago
- Red Team Ethics, resources and more☆17Feb 9, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago
- ACT documentation repo☆17May 22, 2024Updated last year
- This module contains an implementation of the Nilsimsa locality-sensitive hashing algorithm in Java.☆18May 31, 2019Updated 6 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- RDF.rb storage adapter for MongoDB☆40Jan 27, 2012Updated 14 years ago
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- Owlery is a set of REST web services which allow querying of an OWL reasoner containing a configured set of ontologies.☆17Aug 13, 2024Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a diff tool for OWL 2 ontologies☆19Jul 5, 2017Updated 8 years ago
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- Public Arena dataset☆15Jul 20, 2022Updated 3 years ago
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 3 months ago
- End-to-end Machine Learning Pipeline demo using Delta Lake, MLflow and AzureML in Azure Databricks☆18Nov 9, 2019Updated 6 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- ☆20Mar 31, 2019Updated 7 years ago