Datasets:
add note
Browse files
README.md
CHANGED
@@ -46,7 +46,7 @@ Researchers and cybersecurity enthusiasts can leverage D3FEND to:
|
|
46 |
- Fine-tune large language models, focusing on cybersecurity knowledge
|
47 |
graph completion.
|
48 |
- Explore the complexities and nuances of defensive techniques,
|
49 |
-
mappings to MITRE
|
50 |
taxonomies.
|
51 |
- Gain insight into ontology development and modeling in the
|
52 |
cybersecurity domain.
|
@@ -70,6 +70,8 @@ Researchers and cybersecurity enthusiasts can leverage D3FEND to:
|
|
70 |
to ensure the ontology's coherence and consistency.
|
71 |
|
72 |
#### Exporting, Transformation, and Compression:
|
|
|
|
|
73 |
1. **Exporting Inferred Axioms**: Post-verification, I exported
|
74 |
inferred axioms along with asserted axioms and
|
75 |
annotations. [Detailed
|
|
|
46 |
- Fine-tune large language models, focusing on cybersecurity knowledge
|
47 |
graph completion.
|
48 |
- Explore the complexities and nuances of defensive techniques,
|
49 |
+
mappings to MITRE ATT&CK, weaknesses (CWEs), and cybersecurity
|
50 |
taxonomies.
|
51 |
- Gain insight into ontology development and modeling in the
|
52 |
cybersecurity domain.
|
|
|
70 |
to ensure the ontology's coherence and consistency.
|
71 |
|
72 |
#### Exporting, Transformation, and Compression:
|
73 |
+
Note: The following steps were performed using Apache Jena's command
|
74 |
+
line tools. (https://jena.apache.org/documentation/tools/)
|
75 |
1. **Exporting Inferred Axioms**: Post-verification, I exported
|
76 |
inferred axioms along with asserted axioms and
|
77 |
annotations. [Detailed
|