Yuning-J / NVDFeatureAnalysis
Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.
☆13Updated last year
Alternatives and similar repositories for NVDFeatureAnalysis:
Users that are interested in NVDFeatureAnalysis are comparing it to the libraries listed below
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆20Updated last year
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆145Updated last year
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆110Updated 3 years ago
- ☆74Updated last year
- Vulnerability Discovery with Function Representation Learning from Unlabeled Projects☆37Updated 6 years ago
- A deep learning-based vulnerability detection framework☆74Updated 10 months ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆32Updated 6 months ago
- Forecasting Malware Capabilities From Cyber Attack Memory Images☆31Updated 2 years ago
- ☆24Updated 3 months ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- ☠️ Ground-truth dataset for vulnerability prediction (known research datasets and data sources included such as NVD, CVE Details and OSV)…☆84Updated last year
- A logic-based enterprise network security analyzer☆112Updated last year
- ☆20Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- ☆14Updated 4 years ago
- Towards the Detection of Inconsistencies in Public Security Vulnerability Reports☆75Updated 2 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆20Updated 2 years ago
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆65Updated 2 months ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆14Updated 2 years ago
- Discovering Malicious Functionality through Binary Reconstruction☆51Updated 3 years ago
- Additional code and data for the automated malware generation paper☆12Updated 8 months ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 6 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆58Updated 4 years ago
- malicious PowerShell script detection model☆36Updated 3 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆78Updated 5 months ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆10Updated 3 years ago
- ☆30Updated 6 months ago
- MALOnt - an ontology for Malware Threat Intelligence.☆9Updated 3 years ago