MuscleFish / RENet
RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enhancement from tactics to techniques
☆11Updated last year
Related projects: ⓘ
- ☆14Updated last year
- 利用知识图谱分析网络安全事件☆38Updated 4 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆23Updated 4 years ago
- ☆14Updated 4 years ago
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆16Updated 5 years ago
- Official repository for MalKG☆20Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆38Updated 2 years ago
- 该资源是各种溯源图相关的论文和资源总结(含PPT),涉及APT攻击检测、入侵检测、流量日志检测、系统安全等领域,希望对大家有所帮助~☆131Updated 10 months ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆33Updated 2 years ago
- network security named entity recognition, Chinese☆11Updated 5 years ago
- This is a project source for NER in cybersecurity threat intelligence☆19Updated 2 years ago
- ☆70Updated last year
- ☆71Updated last year
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆56Updated 4 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆54Updated 2 years ago
- ☆13Updated this week
- Extracting Attack Behavior from Threat Reports☆75Updated last year
- ☆13Updated this week
- ☆39Updated 4 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆125Updated last year
- ☆19Updated last year
- ☆20Updated 3 years ago
- ☆30Updated 2 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆34Updated 2 years ago
- Public Arena dataset☆12Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆26Updated 4 months ago
- ☆14Updated this week
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆13Updated 3 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆12Updated 9 months ago
- Corpus of auto-labeled text for the cyber security domain☆88Updated 4 years ago