mehgrmlhmpf / AttackGraphGeneratorMasterThesisLinks
This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial control system environments. This viability is evaluated and confirmed with expert interviews about results of this thesis, generated attack graphs and an implemented prototype.
☆12Updated 4 years ago
Alternatives and similar repositories for AttackGraphGeneratorMasterThesis
Users that are interested in AttackGraphGeneratorMasterThesis are comparing it to the libraries listed below
Sorting:
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆156Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆37Updated last year
- ☆79Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆97Updated last year
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆35Updated last year
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 8 months ago
- ☆115Updated 5 years ago
- ☆84Updated 2 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆63Updated 5 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆26Updated 5 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆70Updated 6 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆17Updated 3 years ago
- ☆25Updated 4 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆47Updated 10 months ago
- A logic-based enterprise network security analyzer☆126Updated 2 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆24Updated last year
- ☆30Updated last year
- pretrained BERT model for cyber security text, learned CyberSecurity Knowledge☆183Updated 2 years ago
- provides a new dataset for NER missions in cyber threat intelligence (CTI) field.☆40Updated 3 years ago
- Material from the DARPA Transparent Computing Program☆198Updated 5 years ago
- Cyber Security concepts extracted from unstructured threat intelligence reports using Named Entity Recognition☆109Updated 2 years ago
- Insider threat detection via bert☆20Updated 3 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆51Updated 2 years ago
- ☆12Updated 4 years ago
- The repository consists of : Construction of the corpus, Named Entity Recognition , Relationship Extraction , Construction of knowledge g…☆32Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 7 months ago
- ATLAS: A Sequence-based Learning Approach for Attack Investigation☆165Updated 2 years ago