AnnoCTR corpus for detection and linking of entities in cyber threat reports
☆29Apr 12, 2024Updated 2 years ago
Alternatives and similar repositories for anno-ctr-lrec-coling-2024
Users that are interested in anno-ctr-lrec-coling-2024 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Named entity and triple Dataset to create knowledge graphs for Cybersecurity education☆32Aug 4, 2023Updated 2 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆37Dec 5, 2022Updated 3 years ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆59Aug 29, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆17Oct 27, 2021Updated 4 years ago
- ☆35Mar 31, 2019Updated 7 years ago
- [NeurIPS'24, Spotlight] CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence☆83Feb 11, 2026Updated 2 months ago
- ☆42Feb 18, 2026Updated 2 months ago
- ☆36Jan 27, 2026Updated 2 months ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆118May 27, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Official code for the CVPR 2024 Paper "Can Biases in ImageNet Models Explain Generalization?".☆13Jun 24, 2024Updated last year
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- CyberAttack Sensing and Information Extraction☆73Dec 26, 2024Updated last year
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- The unified ICAS ontology designed to describe information-security related information☆28Feb 6, 2024Updated 2 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆80Apr 28, 2023Updated 2 years ago
- A labeled dataset used for the knowledge graph construction.☆34Nov 30, 2023Updated 2 years ago
- This repository contains the data and code created under the project NLP4Rare-cm-uc3m.☆10Sep 14, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- Benchmarking suite for the Web-Scale Data Management course using Locust☆14Aug 9, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆14Mar 27, 2025Updated last year
- Cyber attack attribution is the process of attempting to trace back a piece of code or malware to a perpetrator of a cyberattack. As cybe…☆15Jan 15, 2021Updated 5 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- Python package providing a simple interface to manipulate Elasticsearch queries and aggregations☆11Apr 1, 2026Updated 2 weeks ago
- 当人工智能遇上安全系列博客及开源代码分享,希望您喜欢~☆19May 20, 2024Updated last year
- ☆12Jan 28, 2022Updated 4 years ago
- ☆44Apr 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- ☆12Jan 16, 2023Updated 3 years ago
- ☆12Jun 7, 2025Updated 10 months ago
- A GitHub workflow to identify employees that have leaked your organization's code☆13May 23, 2023Updated 2 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆21Sep 22, 2025Updated 6 months ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆53Sep 14, 2024Updated last year