Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence
☆19Jan 26, 2024Updated 2 years ago
Alternatives and similar repositories for Adema
Users that are interested in Adema are comparing it to the libraries listed below
Sorting:
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- ☆36Jan 27, 2026Updated last month
- ☆18Aug 10, 2024Updated last year
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- ☆41Feb 18, 2026Updated 2 weeks ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated 2 months ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆42Aug 3, 2022Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- pySCM: The Set Covering Machine in Python☆14Apr 18, 2025Updated 10 months ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- ☆14Feb 12, 2024Updated 2 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 5 years ago
- Few-Shot Relation Extraction with AllenNLP☆13Jan 27, 2019Updated 7 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- academic pages for c2 group☆11Apr 11, 2023Updated 2 years ago
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- Focusing on potential named entities during active label acquisition.☆10Oct 8, 2024Updated last year
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- 采用bert-bilstm-attn的关系抽取模型,基于pytorch ,数据集为百度的开源数据集☆10Jul 27, 2022Updated 3 years ago
- ☆10Sep 7, 2022Updated 3 years ago
- ☆12Mar 23, 2024Updated last year
- python日报,每天分享5篇精选python好文☆10Jun 10, 2020Updated 5 years ago
- 基于python3训练中文wiki词向量、字向量、拼音向量☆12Jan 2, 2022Updated 4 years ago
- 中文实体关系联合抽取baseline☆12Jun 23, 2019Updated 6 years ago
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- Distantly Supervised Biomedical Named Entity Recognition with Dictionary Expansion: https://ieeexplore.ieee.org/document/8983212☆13Jun 4, 2020Updated 5 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 10 years ago
- Code of the CMNLN model☆13Nov 6, 2021Updated 4 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- CasRelPytorch项目的改写版本,根据源码增添了模型预测功能以及预测结果导入neo4j图数据库的功能。☆13Jul 25, 2024Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago