A labeled dataset used for the knowledge graph construction.
☆35Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for LLM-TIKG-dataset
Users that are interested in LLM-TIKG-dataset are comparing it to the libraries listed below
Sorting:
- ☆18Aug 10, 2024Updated last year
- ☆90Jan 4, 2023Updated 3 years ago
- ☆41Feb 18, 2026Updated 2 weeks ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Knowledge Graph Error Detection with Contrastive Confidence Adaption, AAAI 2024☆20May 3, 2024Updated last year
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆21Nov 22, 2023Updated 2 years ago
- APT-KGL: An Intelligent APT Detection System Based on Threat Knowledge and Heterogeneous Provenance Graph Learning☆78Jul 8, 2022Updated 3 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- 基于溯源图的入侵/威胁检测相关论文及阅读笔记☆30Nov 30, 2023Updated 2 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- This is a project source for NER in cybersecurity threat intelligence☆22Jul 4, 2022Updated 3 years ago
- ☆35Mar 31, 2019Updated 6 years ago
- OCR-APT: Reconstructing APT Stories through Subgraph Anomaly Detection and LLMs.☆26Feb 3, 2026Updated last month
- CTINexus is a framework that leverages optimized in-context learning of LLMs to enable data-efficient extraction of cyber threat intellig…☆70Feb 25, 2026Updated last week
- MetaModulation: Learning Variational Feature Hierarchies for Few-Shot Learning with Fewer Tasks (ICML 2023)☆11Aug 15, 2023Updated 2 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆551May 6, 2025Updated 10 months ago
- ☆44Apr 29, 2020Updated 5 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- ☆11Aug 28, 2024Updated last year
- [Tensorflow] A Game Theoretic approach using GAN for Phishing URL synthesis and detection☆11Nov 14, 2022Updated 3 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- BLEU Score in Rust☆12Updated this week
- ☆11Oct 13, 2020Updated 5 years ago
- STIX Schema Development☆75Aug 1, 2018Updated 7 years ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- Codes for our paper "AgentMonitor: A Plug-and-Play Framework for Predictive and Secure Multi-Agent Systems"☆13Dec 13, 2024Updated last year
- SysFlow collection probe☆17Nov 11, 2025Updated 3 months ago
- ☆12Feb 18, 2021Updated 5 years ago
- [Arxiv 2025] Official code and datasets of paper: GNNs as Predictors of Agentic Workflow Performances☆21Jan 15, 2026Updated last month
- ☆12Aug 12, 2024Updated last year
- ☆12Jan 16, 2023Updated 3 years ago
- Trains Sparse Autoencoders based on outputs from language models☆11Oct 7, 2024Updated last year