All Projects → Ebiquity → Unified Cybersecurity Ontology

Ebiquity / Unified Cybersecurity Ontology

Unified Cybersecurity Ontology

Projects that are alternatives of or similar to Unified Cybersecurity Ontology

Csp
The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing confidence and trust among the national Computer Security Incident Response Teams (CSIRTs) of the Member States and for promoting swift and effective operational cooperation.
Stars: ✭ 23 (-47.73%)
Mutual labels:  cybersecurity
Netscan2
active / passive network scanner
Stars: ✭ 27 (-38.64%)
Mutual labels:  cybersecurity
Timbuctoo
an RDF datastore that gives researchers control over the sharing of data between datasets
Stars: ✭ 37 (-15.91%)
Mutual labels:  rdf
Walkoff
A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, tedious tasks slowing them down. #nsacyber
Stars: ✭ 855 (+1843.18%)
Mutual labels:  cybersecurity
Informationmodel
The Information Model of the International Data Spaces implements the IDS reference architecture as an extensible, machine readable and technology independent data model.
Stars: ✭ 27 (-38.64%)
Mutual labels:  rdf
Activetriples
An ActiveModel-like interface for RDF data
Stars: ✭ 31 (-29.55%)
Mutual labels:  rdf
Probe spider
Probe_Spider is a Open Source Intelligence Tool made complete out of Python.
Stars: ✭ 20 (-54.55%)
Mutual labels:  cybersecurity
Serd
A lightweight C library for RDF syntax
Stars: ✭ 43 (-2.27%)
Mutual labels:  rdf
Bib Rdf Pipeline
Scripts and configuration for converting MARC bibliographic records into RDF
Stars: ✭ 27 (-38.64%)
Mutual labels:  rdf
Node Opcua
an implementation of a OPC UA stack fully written in javascript and nodejs - http://node-opcua.github.io/
Stars: ✭ 985 (+2138.64%)
Mutual labels:  cybersecurity
Cturtle
Convert RDF Turtle to N-Triples or N3P
Stars: ✭ 11 (-75%)
Mutual labels:  rdf
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-52.27%)
Mutual labels:  cybersecurity
Grab.js
fast TCP banner grabbing with node.js
Stars: ✭ 33 (-25%)
Mutual labels:  cybersecurity
Microsoft 365 Defender Hunting Queries
Sample queries for Advanced hunting in Microsoft 365 Defender
Stars: ✭ 922 (+1995.45%)
Mutual labels:  cybersecurity
Sparql Engine
🚂 A framework for building SPARQL query engines in Javascript/Typescript
Stars: ✭ 39 (-11.36%)
Mutual labels:  rdf
Askomics
DEPRECATED. See askomics/flaskomics
Stars: ✭ 22 (-50%)
Mutual labels:  rdf
Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+2084.09%)
Mutual labels:  cybersecurity
Smersh
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-2.27%)
Mutual labels:  cybersecurity
Recommendations for engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 39 (-11.36%)
Mutual labels:  cybersecurity
Checkmyhttps
We propose a user-friendly add-on that allows you to check if your encrypted web traffic (SSL/TLS) towards secured Internet servers (HTTPS) is not intercepted (being listened to).
Stars: ✭ 35 (-20.45%)
Mutual labels:  cybersecurity

Unified-Cybersecurity-Ontology

Unified Cybersecurity Ontology

UCO_1_5.owl

The Unified Cybersecurity Ontology (UCO) is intended to support information integration and cyber situational awareness in cybersecurity systems. The ontology incorporates and integrates heterogeneous data and knowledge schemas from different cybersecurity systems and most commonly used cybersecurity standards for information sharing and exchange. The UCO ontology has also been mapped to a number of existing cybersecurity ontologies as well as concepts in the Linked Open Data cloud. Similar to DBpedia which serves as the core for general knowledge in Linked Open Data cloud, we envision UCO to serve as the core for cybersecurity domain, which would evolve and grow with the passage of time with additional cybersecurity data sets as they become available.

If you use UCO or want to refer to it in a paper, please cite:

Zareen Syed, Ankur Padia, Tim Finin, Lisa Mathews and Anupam Joshi, UCO: Unified Cybersecurity Ontology, AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016. http://ebiq.org/p/722

Current versions of the UCO family of ontologies are stored in this repository. We recommend using the following URIs to refer to the ontologoes, This will redirect to the current current versions and will be maintained for the forseeable future.

@prefix atk: <http://purl.org/cyber/atk#> .
@prefix capec: <http://purl.org/cyber/capec#> .
@prefix ckg: <http://purl.org/cyber/ckg#> .
@prefix cve: <http://purl.org/cyber/cve#> .
@prefix cwe: <http://purl.org/cyber/cwe#> .
@prefix cyber: <http://purl.org/cyber#> .
@prefix misp: <http://purl.org/cyber/misp#> .
@prefix mitre: <http://purl.org/cyber/mitre#> .
@prefix stx: <http://purl.org/cyber/stix#> .
@prefix txi: <http://purl.org/cyber/taxii#> .
@prefix uco: <http://purl.org/cyber/uco#> .
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].