The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge graph using py2neo , Analysis on the constructed KG with cypher commands
☆36Dec 5, 2022Updated 3 years ago
Alternatives and similar repositories for Cybersecurity-Knowledge-graph
Users that are interested in Cybersecurity-Knowledge-graph are comparing it to the libraries listed below
Sorting:
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- Official repository for MalKG☆24Feb 12, 2021Updated 5 years ago
- Named entity and triple Dataset to create knowledge graphs for Cybersecurity education☆32Aug 4, 2023Updated 2 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- ☆90Jan 4, 2023Updated 3 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆182Mar 23, 2023Updated 2 years ago
- Unified Cybersecurity Ontology☆109May 6, 2019Updated 6 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- Vulnerability knowledge graph construction☆30Dec 24, 2022Updated 3 years ago
- A Knowledge Graph for Open Source Security Tools☆18Aug 15, 2023Updated 2 years ago
- [JMIR Medical Informatics] Automatic Rare Disease Knowledge Graph Construction☆14Dec 1, 2023Updated 2 years ago
- Automated Discovery and Mapping ATT&CK Tactics and Techniques for Unstructured Cyber Threat Intelligence☆19Jan 26, 2024Updated 2 years ago
- Repository for accompanying materials to Threat Knowledge Graphs.☆18Jul 16, 2025Updated 7 months ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- 利用知识图谱分析网络安全事件☆42Mar 30, 2020Updated 5 years ago
- A Semantic LOG ExtRaction Templating (SLOGERT) Approach☆20Nov 27, 2024Updated last year
- The SEPSES Cyber-KB Engine☆27Nov 27, 2024Updated last year
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆57Aug 29, 2022Updated 3 years ago
- ☆35Jan 30, 2025Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Nov 27, 2023Updated 2 years ago
- AI driven Web Application Firewall☆32Dec 12, 2022Updated 3 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆116May 27, 2023Updated 2 years ago
- ☆31Sep 22, 2024Updated last year
- Security Control Knowledge Graph☆31Apr 24, 2024Updated last year
- ☆41Feb 18, 2026Updated 2 weeks ago
- ☆19Updated this week
- Model Context Protocol Server for Apache OpenDAL™☆34Apr 10, 2025Updated 10 months ago
- A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs,…☆15Feb 25, 2026Updated last week
- Python infrastructure to train paths selectors for symbolic execution engines.☆13Updated this week
- Mikey-Sakke Crypto library and demonstration code for ECCSI/ SAKKE (RFC 6507 and 6508)☆10Jul 16, 2021Updated 4 years ago
- Red-Team - AI Agent to Phish Employees based on Social Intelligence.☆23Dec 28, 2025Updated 2 months ago
- ☆13Jul 29, 2025Updated 7 months ago
- Identifying Skin Diseases with Deep Learning☆12Apr 30, 2018Updated 7 years ago
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- Indian agricultural analysis☆11Nov 20, 2018Updated 7 years ago
- Integration of Iceberg table management into Spark SQL☆11Jan 21, 2020Updated 6 years ago