Datasets:
add note
Browse files
README.md
CHANGED
|
@@ -46,7 +46,7 @@ Researchers and cybersecurity enthusiasts can leverage D3FEND to:
|
|
| 46 |
- Fine-tune large language models, focusing on cybersecurity knowledge
|
| 47 |
graph completion.
|
| 48 |
- Explore the complexities and nuances of defensive techniques,
|
| 49 |
-
mappings to MITRE
|
| 50 |
taxonomies.
|
| 51 |
- Gain insight into ontology development and modeling in the
|
| 52 |
cybersecurity domain.
|
|
@@ -70,6 +70,8 @@ Researchers and cybersecurity enthusiasts can leverage D3FEND to:
|
|
| 70 |
to ensure the ontology's coherence and consistency.
|
| 71 |
|
| 72 |
#### Exporting, Transformation, and Compression:
|
|
|
|
|
|
|
| 73 |
1. **Exporting Inferred Axioms**: Post-verification, I exported
|
| 74 |
inferred axioms along with asserted axioms and
|
| 75 |
annotations. [Detailed
|
|
|
|
| 46 |
- Fine-tune large language models, focusing on cybersecurity knowledge
|
| 47 |
graph completion.
|
| 48 |
- Explore the complexities and nuances of defensive techniques,
|
| 49 |
+
mappings to MITRE ATT&CK, weaknesses (CWEs), and cybersecurity
|
| 50 |
taxonomies.
|
| 51 |
- Gain insight into ontology development and modeling in the
|
| 52 |
cybersecurity domain.
|
|
|
|
| 70 |
to ensure the ontology's coherence and consistency.
|
| 71 |
|
| 72 |
#### Exporting, Transformation, and Compression:
|
| 73 |
+
Note: The following steps were performed using Apache Jena's command
|
| 74 |
+
line tools. (https://jena.apache.org/documentation/tools/)
|
| 75 |
1. **Exporting Inferred Axioms**: Post-verification, I exported
|
| 76 |
inferred axioms along with asserted axioms and
|
| 77 |
annotations. [Detailed
|