voutilad / neo4j-connections-cyber-2021Links
Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021
☆14Updated 3 years ago
Alternatives and similar repositories for neo4j-connections-cyber-2021
Users that are interested in neo4j-connections-cyber-2021 are comparing it to the libraries listed below
Sorting:
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆62Updated last year
- This repository is for development of the Unified Cyber Ontology.☆96Updated 2 months ago
- Open Source Threat Intelligence Platform☆153Updated 2 months ago
- JSON schema representation of Stucco ontology☆19Updated 9 years ago
- Unified Cybersecurity Ontology☆105Updated 6 years ago
- This repository hosts community contributed Kestrel analytics☆17Updated last year
- This repository holds the necessary content to produce the D3FEND ontology distribution.☆86Updated last week
- OWASP Ontology-driven Threat Modelling framework☆39Updated 2 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆41Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated last year
- Structured Threat Intelligence Graph☆95Updated 4 months ago
- version 2 of the Unified Cybersecurity Ontology☆16Updated 8 years ago
- ATLAS tactics, techniques, and case studies data☆78Updated 3 months ago
- Machine Learning applied to Cyber Security Course☆45Updated 5 years ago
- Applied data science in cyber security☆23Updated 3 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆28Updated 3 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆96Updated last year
- Loads STIX-2 into Neo4j☆25Updated 5 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆83Updated last week
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆151Updated 3 months ago
- ☆25Updated 2 years ago
- A MAL language that demonstrates the Maven project structure☆23Updated 3 years ago
- Cyber Intelligence Ontology☆56Updated 8 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 8 months ago
- The NORIA-O project is a data model for IT networks, events and operations information. The ontology is developed using web technologies …☆32Updated 4 months ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆15Updated 3 years ago
- ☆116Updated 5 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆59Updated last year