Category VIEW ALL
ATIS: Malware Analysis and STIX Data Transformation
Technology No. CW-22-43-ATIS
CATCH: Comprehensive Telemetry Analysis and Threat Intelligence Framework for Advanced Security
Technology No. CW-24-45-CATCH
EMV: Exploit, Malware, and Vulnerability Scoring GUI
Technology No. CW-19-17-EMV
ESE: Comprehensive STIX1-to-STIX2 Conversion Tool
Technology No. CW-23-03-ESE
INLQOSD: Wireless Network Quality of Service and Security Dataset
Technology No. CW-24-53 Wireless QOS
PSSE for Human Factor Research
Technology No. CW-25-11 PSSE
STAR: Structured Threat Automated Response
Technology No. CW-20-10-STAR
STIG: Graph-Based Threat Intelligence and Response System
Technology No. CW-18-04-A-STIG
STIXEnforcer: Advanced STIX 2.1 Data Enrichment and Error Correction Tool
Technology No. CW-22-44-STIXEnforcer
STOAT: Automated Scoring Tool for Software Weaknesses
Technology No. CW-22-03-STOAT
Storm DEPART: Damage Estimate Prediction and Recovery Tool
Technology No. CW-24-26-StormDEPART
STOTS: Network Threat Analysis and Visualization Suite
Technology No. CW-19-10-STOTS