version 2 of the Unified Cybersecurity Ontology
☆16May 7, 2017Updated 8 years ago
Alternatives and similar repositories for uco2
Users that are interested in uco2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- This repository is for development of the Unified Cyber Ontology.☆107Mar 13, 2026Updated last week
- GitHub action that validates the syntax of selected RDF files in the repository☆12Feb 12, 2024Updated 2 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆72Sep 23, 2025Updated 6 months ago
- ☆89Jan 4, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- OWASP Ontology-driven Threat Modelling framework☆40Jul 11, 2023Updated 2 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 3 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Slides from my PhD thesis defense at MIT CSAIL, October 2018☆10Mar 4, 2019Updated 7 years ago
- Documentation and Issue Tracking for Stucco☆20Mar 7, 2017Updated 9 years ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- ☆44Apr 29, 2020Updated 5 years ago
- Loads STIX-2 into Neo4j☆26Jul 11, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NSL KDD binary classification with Transformer☆10Aug 17, 2020Updated 5 years ago
- Alibaba Cloud Credentials for Go☆16Mar 14, 2026Updated last week
- ☆16Dec 19, 2025Updated 3 months ago
- Draw AWS network graph with Graphviz.☆17Apr 3, 2014Updated 11 years ago
- Python library and command-line interface for inspecting and visualizing RDF models aka ontologies.☆245Mar 7, 2024Updated 2 years ago
- Approximate matching using Hierarchical Bloom Filter Trees. Based on mrsh-v2.☆14Feb 20, 2021Updated 5 years ago
- Materials for AWS Training☆15Jul 21, 2021Updated 4 years ago
- 将pdf分成彩色和黑白部分,便于打印☆11Mar 9, 2025Updated last year
- ☆10Jan 21, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- 健康码演示仅用自娱自乐,演示用途,请勿用于非法,违法,犯罪,后果自负,本软件不承担任何法律责任! 粤康码演示软件使用请点击: https://yuekma.github.io. 一.粤康码破解 三.辽事通破解 四.龙江健康码破解 五.山西省健康码破解 六.随申码破解 七.北…☆18Jun 24, 2022Updated 3 years ago
- Net Commander supercharges Visual Studio Code for Network Engineers, DevOps Engineers and Solution Architects streamlining everyday workf…☆24Feb 19, 2026Updated last month
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- ACT documentation repo☆18May 22, 2024Updated last year
- This module contains an implementation of the Nilsimsa locality-sensitive hashing algorithm in Java.☆18May 31, 2019Updated 6 years ago
- Awesome Security Feeds a curated, structured and automation-friendly collection of security RSS/Atom sources. Based on https://securityfe…☆29Updated this week
- Owlery is a set of REST web services which allow querying of an OWL reasoner containing a configured set of ontologies.☆17Aug 13, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Training Vision Transformers from Scratch for Malware Classification☆29Aug 18, 2021Updated 4 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- ☆10Jul 3, 2020Updated 5 years ago
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 2 months ago