A Simulated Optimal Intrusion Response Game
☆21Apr 3, 2022Updated 4 years ago
Alternatives and similar repositories for gym-optimal-intrusion-response
Users that are interested in gym-optimal-intrusion-response are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆85Feb 23, 2025Updated last year
- Multi-Agent Reinforcement Learning on network-security☆20Apr 12, 2022Updated 4 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆67May 21, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Reinforcement Learning (RL) simulation environment built for training and evaluating defensive and offensive autonomous models on simul…☆44Aug 26, 2025Updated 7 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆143Mar 25, 2026Updated 3 weeks ago
- TTCP CAGE Challenge 2☆57Sep 25, 2025Updated 6 months ago
- Random Network Topology Generator☆24Jun 3, 2021Updated 4 years ago
- A Python and Jsonnet framework for handling espanso configurations☆11Oct 6, 2025Updated 6 months ago
- ☆59Sep 25, 2025Updated 6 months ago
- 爱恩斯坦棋代码☆10Nov 24, 2020Updated 5 years ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 4 years ago
- 强化学习中纳什Qlearning 实现矩阵博弈☆30Feb 25, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆37May 13, 2024Updated last year
- 亚马逊棋冠军程序细节☆12Jan 7, 2026Updated 3 months ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- 微软创新杯参赛作品,用C#语言,Unity 3D游戏引擎和Vuforia AR引擎制作的一款解密类AR小游戏☆13Mar 13, 2018Updated 8 years ago
- Various explorations into the game of Poker using MCTS, NFSP, and image-recognition/web-scraping☆13Oct 23, 2020Updated 5 years ago
- Powerful XML<->JSON JavaScript mapping library.☆15Apr 1, 2026Updated 2 weeks ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- 青锋-springboot2.6.x+vue3-antdesign-vite开源架构,实现了系统管理模块、权限控制模块(菜单权限、功能按钮权限、数据权限)、代码生成器(单表、树表)、quartz动态定时器等功能。☆11Apr 30, 2022Updated 3 years ago
- Parallel Monte Carlo Tree Search, see README.md for more detailed usage and information.☆50Jan 10, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆17Nov 24, 2025Updated 4 months ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated 2 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- ☆11May 3, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A collection of environments and reference agents for planning and reinforcement learning research in partially observable, multi-agent …☆33Jun 2, 2025Updated 10 months ago
- ☆26Jan 13, 2021Updated 5 years ago
- ☆16Jul 4, 2019Updated 6 years ago
- Android app for tracking your locations and uploading them on your private server☆11Jul 1, 2017Updated 8 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- This is an attempt to summarize feature engineering methods that I have learned over the course of my graduate school.☆11Mar 3, 2022Updated 4 years ago