SIGN-IN REGISTER menu person_pinSign-in addRegister Home Products Home All products Structured Threat Search by keyword search Apply view_module view_stream ATIS: Malware Analysis and STIX Data Transformation Find out more EMV: Exploit, Malware, and Vulnerability Scoring GUI Find out more ESE: Comprehensive STIX1-to-STIX2 Conversion Tool Find out more STAR: Structured Threat Automated Response Find out more STIG: Graph-Based Threat Intelligence and Response System Find out more STIXEnforcer: Advanced STIX 2.1 Data Enrichment and Error Correction Tool Find out more STOAT: Automated Scoring Tool for Software Weaknesses Find out more Storm DEPART: Damage Estimate Prediction and Recovery Tool Find out more STOTS: Network Threat Analysis and Visualization Suite Find out more Category VIEW ALL chevron_right Deep Lynx (12) chevron_right Cybersecurity and Malware Analysis (41) chevron_right Framework for Optimization of ResourCes and Economics (5) chevron_right Market & Supply Chain Models (9) chevron_right Structured Threat (9) chevron_right Hydropower (8) chevron_right Nuclear Computational Resource Center (32) chevron_right Binary Analysis (4) chevron_right Specific Use Case (0) chevron_right Software Development and IT (5) chevron_right Modeling and Simulation (64) chevron_right Nuclear Power Plant Safety (18) chevron_right Imaging (5) chevron_right Grid (12) chevron_right Environmental and Agricultural Technologies (0) chevron_right Energy and Power Systems (0) chevron_right Economic Modeling (17) chevron_right Digital Twin (14) chevron_right Dataset (0) chevron_right Data Analytics and Machine Learning (0) chevron_right Biomass (3)