Vulnerability knowledge graph construction
☆30Dec 24, 2022Updated 3 years ago
Alternatives and similar repositories for VulKG
Users that are interested in VulKG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Asses…☆19Mar 8, 2023Updated 3 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆36Dec 5, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- From Dataset Labeling, Entity Extraction to production Knowledge Graph Deployment: The Power of NLP and LLMs Combined.☆12May 14, 2024Updated last year
- Modelling Capture-the-Flag Challenges Using Reinforcement Learning☆15Jul 30, 2022Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 3 years ago
- ☆17Mar 27, 2025Updated 11 months ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- ☆89Jan 4, 2023Updated 3 years ago
- Code for the paper "Knowledge Base Completion for Constructing Problem-Oriented Medical Records" at MLHC 2020☆11Jun 8, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Source Code Vulnerability Detection Tools(SCVDT)provides a vulnerable code database, vulnerability detection service for Java and C/C++ p…☆117Jun 21, 2021Updated 4 years ago
- ☆19Sep 7, 2025Updated 6 months ago
- ☆10Jul 9, 2020Updated 5 years ago
- Data samples for Observability and SIEM☆15Oct 29, 2025Updated 4 months ago
- Master UI for ROBOKOP☆15Mar 31, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Extra documentation (knowledge graph, images, etc..) for the paper "Legal Knowledge Extraction for Knowledge Graph Based Question-Answeri…☆15Jan 16, 2023Updated 3 years ago
- Uncertain Knowledge Graphs Embedding with BERT Pretrained Language Model☆17Oct 10, 2024Updated last year
- Neo4j Cybersecurity Demo☆18Mar 16, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Get all cve corresponding to a specific keyword or a list of keywords from the mitre database (https://cve.mitre.org/)☆17Aug 20, 2022Updated 3 years ago
- ☆27Feb 19, 2024Updated 2 years ago
- ☆12Oct 14, 2025Updated 5 months ago
- QA system based on Medical knowledge graph☆15Jun 26, 2019Updated 6 years ago
- [JMIR Medical Informatics] Automatic Rare Disease Knowledge Graph Construction☆14Dec 1, 2023Updated 2 years ago
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 6 years ago
- CTIBench: A Benchmark for Evaluating LLMs in Cyber Threat Intelligence, NeurIPS 2024, Spotlight.☆80Feb 11, 2026Updated last month
- This project is to implement the algorithm discussed in Efficient Identification of Overlapping Communities.☆15Nov 8, 2021Updated 4 years ago
- BNNetSimulator is a packet-level network simulator to generate datasets for research and analysis.☆18Feb 8, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 通过微信公众号推送漏洞消息☆18Dec 27, 2021Updated 4 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆28Apr 12, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 4 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- Knowledge Graph Construction From Text☆27Feb 5, 2018Updated 8 years ago
- ☆24Dec 10, 2022Updated 3 years ago