☆12Jan 16, 2023Updated 3 years ago
Alternatives and similar repositories for Knowledge-Graph-Cyber-Security
Users that are interested in Knowledge-Graph-Cyber-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- Repository for accompanying materials to Threat Knowledge Graphs.☆21Jul 16, 2025Updated 9 months ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- EMNLP 22' (Oral): SQUIRE: A Sequence-to-sequence Framework for Multi-hop Knowledge Graph Reasoning☆35Jun 8, 2023Updated 2 years ago
- 2016年课程设计:人事管理系统(荆超等11人)☆10Jul 13, 2016Updated 9 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated 2 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- 自写的src开源脚本☆19Feb 17, 2025Updated last year
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- CasRelPytorch项目的改写版本,根据源码增添了模型预测功能以及预测结果导入neo4j图数据库的功能。☆13Jul 25, 2024Updated last year
- Security Control Knowledge Graph☆43Jul 6, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- chrome插件☆13Mar 19, 2025Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆37Dec 5, 2022Updated 3 years ago
- 基于RouteVulScan插件的小更新 ,添加了路由过滤功能和修复一些小bug☆14Sep 9, 2024Updated last year
- StrangeCart project public documentation☆12Jan 1, 2025Updated last year
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆71Sep 8, 2023Updated 2 years ago
- This repository contains the data and code created under the project NLP4Rare-cm-uc3m.☆10Sep 14, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆11Apr 8, 2024Updated 2 years ago
- Representation Learning with Ordered Relation Paths for Knowledge Graph Completion (EMNLP 2019)☆11Nov 17, 2019Updated 6 years ago
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- KG☆14Nov 26, 2022Updated 3 years ago
- Drone Cloud Platfrom is a drone ground control system (GCS) build by Vue.js and it provide user to control there ardupilot-based drone th…☆15May 16, 2022Updated 3 years ago
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆21Nov 22, 2023Updated 2 years ago
- Reinforcement learning (RL) is an effective method to find reasoning pathways in incomplete knowledge graphs (KGs). To overcome the chall…☆26Oct 13, 2024Updated last year
- ☆19Nov 27, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The SEPSES Cyber-KB Engine☆28Nov 27, 2024Updated last year
- Code for “Massive Digital Over-the-Air Computation for Communication-Efficient Federated Edge Learning”☆24Oct 21, 2024Updated last year
- ☆19Apr 10, 2024Updated 2 years ago
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated 3 months ago
- 基于实战沉淀下的各种弱口令字典☆18Aug 8, 2024Updated last year
- Code and models for the paper Path Reasoning over Knowledge Graph: A Multi-Agent and Reinforcement Learning Based Method☆18Nov 23, 2020Updated 5 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 3 years ago