wikipunk commited on
Commit
c6e77c9
1 Parent(s): 29c1bab
Files changed (1) hide show
  1. README.md +3 -1
README.md CHANGED
@@ -46,7 +46,7 @@ Researchers and cybersecurity enthusiasts can leverage D3FEND to:
46
  - Fine-tune large language models, focusing on cybersecurity knowledge
47
  graph completion.
48
  - Explore the complexities and nuances of defensive techniques,
49
- mappings to MITRE ATTACK, weaknesses (CWEs), and cybersecurity
50
  taxonomies.
51
  - Gain insight into ontology development and modeling in the
52
  cybersecurity domain.
@@ -70,6 +70,8 @@ Researchers and cybersecurity enthusiasts can leverage D3FEND to:
70
  to ensure the ontology's coherence and consistency.
71
 
72
  #### Exporting, Transformation, and Compression:
 
 
73
  1. **Exporting Inferred Axioms**: Post-verification, I exported
74
  inferred axioms along with asserted axioms and
75
  annotations. [Detailed
 
46
  - Fine-tune large language models, focusing on cybersecurity knowledge
47
  graph completion.
48
  - Explore the complexities and nuances of defensive techniques,
49
+ mappings to MITRE ATT&CK, weaknesses (CWEs), and cybersecurity
50
  taxonomies.
51
  - Gain insight into ontology development and modeling in the
52
  cybersecurity domain.
 
70
  to ensure the ontology's coherence and consistency.
71
 
72
  #### Exporting, Transformation, and Compression:
73
+ Note: The following steps were performed using Apache Jena's command
74
+ line tools. (https://jena.apache.org/documentation/tools/)
75
  1. **Exporting Inferred Axioms**: Post-verification, I exported
76
  inferred axioms along with asserted axioms and
77
  annotations. [Detailed