stucco-archive / ontologyView external linksLinks
JSON schema representation of Stucco ontology
☆19Apr 14, 2016Updated 9 years ago
Alternatives and similar repositories for ontology
Users that are interested in ontology are comparing it to the libraries listed below
Sorting:
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- The SEPSES Cyber-KB Engine☆26Nov 27, 2024Updated last year
- Extract relationships between cyber security entities within unstructured text☆24Sep 28, 2018Updated 7 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )☆11Feb 23, 2016Updated 9 years ago
- Public Arena dataset☆14Jul 20, 2022Updated 3 years ago
- Development of the NIST vulnerability data ontology (Vulntology).☆43Nov 10, 2025Updated 3 months ago
- Cyber Range Automated Construction Kit☆15Oct 29, 2020Updated 5 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆40Apr 25, 2024Updated last year
- ☆32Jan 28, 2021Updated 5 years ago
- 一种用于序列标注任务的数据标注(分词,NER)的工具☆11Jun 3, 2020Updated 5 years ago
- An instance of the Newsapps Boundary Service for the City of Tyler and Smith County, Texas.☆13Nov 29, 2011Updated 14 years ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 5 years ago
- ☆86Mar 29, 2023Updated 2 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- A non-normative turtle-formatted ontology version of the Activity Streams 2.0 vocabulary☆11Dec 10, 2023Updated 2 years ago
- Python implementation of the Huffman Code compression algorithm.☆14Apr 18, 2013Updated 12 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Nov 25, 2025Updated 2 months ago
- VLESS-XTLS-uTLS-REALITY setup script.☆11May 3, 2023Updated 2 years ago
- Suggest methods for bots used in Trickster Cards.☆10Feb 9, 2026Updated last week
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 2 years ago
- This repository is for development of the Unified Cyber Ontology.☆104Nov 24, 2025Updated 2 months ago
- simple react native todo list app powered by dfinity☆11Aug 3, 2021Updated 4 years ago
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- Literature Review/ Summary of methods for extraction of causal relations from text☆10Oct 6, 2021Updated 4 years ago
- Repository of the governance working group☆10Nov 11, 2022Updated 3 years ago
- MapAttack client for Android☆24Oct 10, 2011Updated 14 years ago
- POSIX sh formatter and client for tldr pages☆12Dec 27, 2022Updated 3 years ago
- pySCM: The Set Covering Machine in Python☆14Apr 18, 2025Updated 9 months ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 6 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Tool to visualize and explain LTL counterexamples generated by the NuSMV model checker☆10Sep 7, 2020Updated 5 years ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- An x86-64 instruction decoder.☆16Mar 11, 2024Updated last year
- A resque plugin to fetch the result from a job's perform method☆15Sep 11, 2010Updated 15 years ago
- React components to use DFINITYs Internet Identity Authentication☆18Apr 15, 2022Updated 3 years ago
- ☆11May 3, 2019Updated 6 years ago