☆12Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for -cyborg-cage-2
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TTCP CAGE Challenge 2☆57Sep 25, 2025Updated 6 months ago
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆13Dec 2, 2024Updated last year
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆17Oct 12, 2022Updated 3 years ago
- CAGE Challenge 2 with bug fixes, an alternate simplified version and discussion/clarification about gameplay and using this environment.☆54Jan 7, 2026Updated 2 months ago
- ☆25Apr 1, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆59Sep 25, 2025Updated 6 months ago
- Results reproductions & comparisons between OpenSpiel implementations, associated paper & originating works☆18Mar 2, 2021Updated 5 years ago
- ☆20Oct 22, 2021Updated 4 years ago
- GNN MARL Approach for the CAGE-4 automated cyber defense challenge☆15Nov 18, 2025Updated 4 months ago
- ☆19Mar 10, 2022Updated 4 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks (ICLR 2023 Spotlight)☆14Sep 28, 2025Updated 6 months ago
- Official repository of the paper "Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning".☆12Mar 28, 2022Updated 4 years ago
- A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks (AAAI'20)☆11Jun 10, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Python scripts to download imagenet images and pre-proccess them☆11Jun 29, 2020Updated 5 years ago
- PyTorch re-implementation of 'A comprehensive study on cross-view gait based human identification with deep CNNs'☆13Jun 26, 2019Updated 6 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- ☆18Aug 15, 2022Updated 3 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- [NDSS'25] "Provably Unlearnable Data Examples"☆22Dec 10, 2025Updated 3 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- This repository contains code implementation of the paper "AI-Guardian: Defeating Adversarial Attacks using Backdoors, at IEEE Security a…☆14Aug 13, 2023Updated 2 years ago
- Breaking Certifiable Defenses☆17Nov 22, 2022Updated 3 years ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- Deep Spiking Reinforcement Learning☆26Oct 28, 2023Updated 2 years ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- ☆12Jul 2, 2020Updated 5 years ago
- ☆16Feb 12, 2019Updated 7 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆86Feb 23, 2025Updated last year
- ☆14Jul 14, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 6 months ago
- A configurable rule-based labeling tool for network flow files.☆18May 22, 2023Updated 2 years ago
- A library for deep learning with Spiking Neural Networks (SNN).☆38Mar 16, 2026Updated 2 weeks ago
- An SDN based security system for Botnet based DDoS attacks.☆15Jul 28, 2015Updated 10 years ago
- A GNU Radio real-time on-off keying demodulator☆20Sep 5, 2019Updated 6 years ago
- MulVAL interaction rules and their mapping to MITRE ATT&CK Techniques☆13Oct 21, 2024Updated last year
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated last year