This repository contains the dataset and source code of the submission: From threat reports to continuous threat intelligence: A comparison of attacktechnique extraction methods from textual artifacts.
To use the source code, do the following:
- Install Python 3.7+
- Install
pipenv
in your environment - Clone this repository
- Go to the cloned repository and run
pipenv install
- You should be able to run each python scripts independenly.