This repo contains the data and codes for the paper submitted to ACM TKDD, titled "A Compact Vulnerability Knowledge Graph for Risk Assessment".
☆19Mar 8, 2023Updated 3 years ago
Alternatives and similar repositories for VulKG
Users that are interested in VulKG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE\CWE\CAPEC\ATT&CK, security knowledge graph, knowledge graph completion☆14Jun 9, 2023Updated 2 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- Keras implementation of path-based link prediction model for knowledge graph completion☆24Aug 29, 2022Updated 3 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- ☆12Jan 16, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Jan 23, 2021Updated 5 years ago
- Representation Learning with Ordered Relation Paths for Knowledge Graph Completion (EMNLP 2019)☆11Nov 17, 2019Updated 6 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- ☆12Oct 5, 2022Updated 3 years ago
- Unified Maude model-checking tool☆13Updated this week
- KG☆14Nov 26, 2022Updated 3 years ago
- Reinforcement learning (RL) is an effective method to find reasoning pathways in incomplete knowledge graphs (KGs). To overcome the chall…☆26Oct 13, 2024Updated last year
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Code and models for the paper Path Reasoning over Knowledge Graph: A Multi-Agent and Reinforcement Learning Based Method☆18Nov 23, 2020Updated 5 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆71Sep 8, 2023Updated 2 years ago
- Corpus of auto-labeled text for the cyber security domain☆97Nov 27, 2019Updated 6 years ago
- SWORD: A Whole Program Race Detector for Java☆13Jan 30, 2021Updated 5 years ago
- ☆12Mar 23, 2024Updated 2 years ago
- BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection☆10Oct 2, 2020Updated 5 years ago
- ☆19Jan 31, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This is the source code of "Intrusion Detection of Industrial Internet-of-Things Based on Reconstructed Graph Neural Networks"☆12Jan 19, 2024Updated 2 years ago
- Toy Markdown Editor With Python & Tkinter☆11Jan 14, 2020Updated 6 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- The POLAR Framework: polar Opposites Enable Interpretability of Pre-Trained Word Embeddings☆13Aug 3, 2020Updated 5 years ago
- Evaluating model decay as the underlying concepts for classification evolve☆17Apr 25, 2019Updated 6 years ago
- Tool for learning linear temporal logic formulas using combinatorial approach☆13Jan 11, 2025Updated last year
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- [JJIT2018] Official repository for "Braille to Text Translation for Bengali Language: A Geometric Approach"☆10Nov 6, 2025Updated 5 months ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆44Apr 29, 2020Updated 5 years ago
- ☆10Sep 14, 2020Updated 5 years ago
- An SSH honeypot written entirely in Go.☆13Dec 4, 2025Updated 4 months ago
- Code for the paper "Code Generation From Flowcharts with Texts: A Benchmark Dataset and An Approach"☆13Feb 11, 2023Updated 3 years ago
- CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics☆20Mar 25, 2026Updated 3 weeks ago
- 基于Python爬虫的CNNVD漏洞信息监控脚本——Cnnvd_monitor,实现了对CNNVD官网平台的实时监控、数据获取、入库、并用微信进行实时推送、并将获取的数据进行Web端表格展示。☆15Aug 9, 2021Updated 4 years ago
- The source code of Disconnected Emerging Knowledge Graph Oriented Inductive Link Prediction☆10May 6, 2022Updated 3 years ago