Datasets:
tweak readme
Browse files
README.md
CHANGED
@@ -32,24 +32,24 @@ dataset_info:
|
|
32 |
viewer: false
|
33 |
---
|
34 |
|
35 |
-
# D3FEND
|
36 |
-
A knowledge graph of cybersecurity countermeasures
|
37 |
|
38 |
### Overview
|
39 |
D3FEND encodes a countermeasure knowledge base in the form of a
|
40 |
knowledge graph. It meticulously organizes key concepts and relations
|
41 |
in the cybersecurity countermeasure domain, linking each to pertinent
|
42 |
-
references in the cybersecurity literature.
|
43 |
-
offers a detailed insight into the complexities of cybersecurity
|
44 |
-
countermeasures.
|
45 |
|
46 |
### Use-cases
|
47 |
-
Researchers can leverage
|
48 |
-
|
49 |
-
|
50 |
-
|
51 |
-
|
52 |
-
|
|
|
|
|
|
|
53 |
|
54 |
### Preprocessing
|
55 |
|
|
|
32 |
viewer: false
|
33 |
---
|
34 |
|
35 |
+
# D3FEND: A knowledge graph of cybersecurity countermeasures
|
|
|
36 |
|
37 |
### Overview
|
38 |
D3FEND encodes a countermeasure knowledge base in the form of a
|
39 |
knowledge graph. It meticulously organizes key concepts and relations
|
40 |
in the cybersecurity countermeasure domain, linking each to pertinent
|
41 |
+
references in the cybersecurity literature.
|
|
|
|
|
42 |
|
43 |
### Use-cases
|
44 |
+
Researchers and cybersecurity enthusiasts can leverage D3FEND to:
|
45 |
+
- Develop sophisticated graph-based models.
|
46 |
+
- Fine-tune large language models, focusing on cybersecurity knowledge
|
47 |
+
graph completion.
|
48 |
+
- Explore the complexities and nuances of defensive techniques,
|
49 |
+
mappings to MITRE ATTACK, weaknesses (CWEs), and cybersecurity
|
50 |
+
taxonomies.
|
51 |
+
- Gain insight into ontology development and modeling in the
|
52 |
+
cybersecurity domain.
|
53 |
|
54 |
### Preprocessing
|
55 |
|