利用知识图谱分析网络安全事件
☆42Mar 30, 2020Updated 5 years ago
Alternatives and similar repositories for Knowledge-Graph-Analyze
Users that are interested in Knowledge-Graph-Analyze are comparing it to the libraries listed below
Sorting:
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆10Mar 7, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- cisp考试资料☆13Aug 13, 2022Updated 3 years ago
- ☆12Jun 11, 2021Updated 4 years ago
- Script from the paper generating encrypted network. Dataset☆11Sep 1, 2021Updated 4 years ago
- ☆41Feb 18, 2026Updated 2 weeks ago
- ☆36Jan 27, 2026Updated last month
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- https://www.cdxy.me/?p=806☆32May 20, 2019Updated 6 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- JavaRce complements project - use RASP to prevent vulnerabilities☆24Apr 22, 2024Updated last year
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 4 years ago
- BAG-MulVAL: Auxiliary analyzer of intranet security☆21Oct 13, 2023Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Aug 1, 2023Updated 2 years ago
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- Graph database version of the CVE database☆26Dec 8, 2022Updated 3 years ago
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- goscanner is a tool for large-scale TLS and SSH scans☆33Jan 7, 2026Updated last month
- 17条检测cobaltstrike的suricata-ids规则☆69Jun 20, 2022Updated 3 years ago
- Security Control Knowledge Graph☆31Apr 24, 2024Updated last year
- ATT&CK 中文版☆69Nov 28, 2025Updated 3 months ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- bootstrap式知识三元组抽取 开放式实体关系抽取 依靠依存分析确定可能的实体和关系☆23Feb 20, 2019Updated 7 years ago
- This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sa…☆219Apr 30, 2024Updated last year
- ☆31Mar 2, 2018Updated 8 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- ☆85Dec 18, 2020Updated 5 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- ☆22Aug 29, 2025Updated 6 months ago