☆12Jan 16, 2023Updated 3 years ago
Alternatives and similar repositories for Knowledge-Graph-Cyber-Security
Users that are interested in Knowledge-Graph-Cyber-Security are comparing it to the libraries listed below
Sorting:
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- Repository for accompanying materials to Threat Knowledge Graphs.☆18Jul 16, 2025Updated 8 months ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- EMNLP 22' (Oral): SQUIRE: A Sequence-to-sequence Framework for Multi-hop Knowledge Graph Reasoning☆36Jun 8, 2023Updated 2 years ago
- 2016年课程设计:人事管理系统(荆超等11人)☆10Jul 13, 2016Updated 9 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated last year
- ☆12Feb 18, 2021Updated 5 years ago
- 自写的src开源脚本☆19Feb 17, 2025Updated last year
- SECURE: Benchmarking Generative Large Language Models as a Cyber Advisory☆17Aug 28, 2024Updated last year
- CasRelPytorch项目的改写版本,根据源码增添了模型预测功能以及预测结果导入neo4j图数据库的功能。☆13Jul 25, 2024Updated last year
- Security Control Knowledge Graph☆42Jul 6, 2022Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- chrome插件☆13Mar 19, 2025Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆70Sep 8, 2023Updated 2 years ago
- 基于RouteVulScan插件的小更新,添加了路由过滤功能和修复一些小bug☆14Sep 9, 2024Updated last year
- StrangeCart project public documentation☆12Jan 1, 2025Updated last year
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- This repository contains the data and code created under the project NLP4Rare-cm-uc3m.☆10Sep 14, 2021Updated 4 years ago
- Representation Learning with Ordered Relation Paths for Knowledge Graph Completion (EMNLP 2019)☆11Nov 17, 2019Updated 6 years ago
- ☆11Apr 8, 2024Updated last year
- Some personal work on DARPA TC engagement5☆21Aug 7, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- KG☆14Nov 26, 2022Updated 3 years ago
- Drone Cloud Platfrom is a drone ground control system (GCS) build by Vue.js and it provide user to control there ardupilot-based drone th…☆15May 16, 2022Updated 3 years ago
- Implementation of the paper: "Anomaly Detection in Continuous-Time Temporal Provenance Graphs". The code follows the CTDG framework https…☆21Nov 22, 2023Updated 2 years ago
- Reinforcement learning (RL) is an effective method to find reasoning pathways in incomplete knowledge graphs (KGs). To overcome the chall…☆26Oct 13, 2024Updated last year
- ☆19Nov 27, 2023Updated 2 years ago
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- Code for “Massive Digital Over-the-Air Computation for Communication-Efficient Federated Edge Learning”☆22Oct 21, 2024Updated last year
- ☆19Apr 10, 2024Updated last year
- An LLM for CTI reports - to be presented at FIRST Fukuoka 2024☆23Jan 26, 2026Updated last month
- 基于实战沉淀下的各种弱口令字典☆18Aug 8, 2024Updated last year
- Code and models for the paper Path Reasoning over Knowledge Graph: A Multi-Agent and Reinforcement Learning Based Method☆18Nov 23, 2020Updated 5 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago