A Simulated Optimal Intrusion Response Game
☆21Apr 3, 2022Updated 4 years ago
Alternatives and similar repositories for gym-optimal-intrusion-response
Users that are interested in gym-optimal-intrusion-response are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆87Feb 23, 2025Updated last year
- Multi-Agent Reinforcement Learning on network-security☆21Apr 12, 2022Updated 4 years ago
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- YAWNING TITAN is an abstract, graph based cyber-security simulation environment that supports the training of intelligent agents for auto…☆67May 21, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A curated list of resources dedicated to reinforcement learning applied to cyber security.☆1,043Apr 7, 2026Updated last month
- A Reinforcement Learning (RL) simulation environment built for training and evaluating defensive and offensive autonomous models on simul…☆45Aug 26, 2025Updated 8 months ago
- TTCP CAGE Challenge 2☆57Sep 25, 2025Updated 7 months ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆144Mar 25, 2026Updated last month
- ☆10Apr 23, 2021Updated 5 years ago
- ☆59Sep 25, 2025Updated 7 months ago
- Code for "Training Adversarially Robust Sparse Networks via Bayesian Connectivity Sampling" [ICML 2021]☆10Mar 14, 2022Updated 4 years ago
- 强化学习中纳什Qlearning 实现矩 阵博弈☆31Feb 25, 2019Updated 7 years ago
- MulVAL: A logic-based, data-driven enterprise network security analyzer - Originally developed at Kansas State University, updated for Cy…☆37May 13, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- [ICLR 2023] PyTorch code for DFPC: Data flow driven pruning of coupled channels without data.☆15Aug 25, 2023Updated 2 years ago
- Offline RL algoritms implemented in Stable Baselines3 (pytorch)☆10Dec 7, 2021Updated 4 years ago
- 亚马逊棋冠军程序细节☆14Jan 7, 2026Updated 4 months ago
- CyATP: Cybersecurity Awareness Training Platform☆23Feb 15, 2022Updated 4 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- 微软创新杯参赛作品,用C#语言,Unity 3D游戏引擎和Vuforia AR引擎制作的一款解密类AR小游戏☆13Mar 13, 2018Updated 8 years ago
- Various explorations into the game of Poker using MCTS, NFSP, and image-recognition/web-scraping☆13Oct 23, 2020Updated 5 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- 青锋-springboot2.6.x+vue3-antdesign-vite开源架构,实现了系统管理模块、权限控制模块(菜单权限、功能按钮权限、数据权限)、代码生成器(单表、树表)、quartz动态定时器等功能。☆11Apr 30, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- NJU程设实验项目三:爱因斯坦棋☆10May 24, 2019Updated 6 years ago
- Parallel Monte Carlo Tree Search, see README.md for more detailed usage and information.☆50Jan 10, 2021Updated 5 years ago
- ☆17Nov 24, 2025Updated 5 months ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated 2 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆16Jan 2, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- More efficient exploration for reinforcement learning in two-player, zero-sum game☆21Jul 30, 2024Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- A collection of environments and reference agents for planning and reinforcement learning research in partially observable, multi-agent …☆33Jun 2, 2025Updated 11 months ago
- ☆26Jan 13, 2021Updated 5 years ago
- Code for Chain-of-Thought Hijacking☆26Nov 10, 2025Updated 5 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- illustrate Neural Network (python+LaTeX)☆14Oct 4, 2020Updated 5 years ago