john-cardiff / -cyborg-cage-2View external linksLinks
☆12Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for -cyborg-cage-2
Users that are interested in -cyborg-cage-2 are comparing it to the libraries listed below
Sorting:
- TTCP CAGE Challenge 2☆56Sep 25, 2025Updated 4 months ago
- This is the code repository for the paper "Zero-Sum Stochastic Stackelberg Games".☆16Oct 12, 2022Updated 3 years ago
- Team Mindrake's hierarchical RL solution to the second CybORG CAGE challenge.☆13Dec 2, 2024Updated last year
- Results reproductions & comparisons between OpenSpiel implementations, associated paper & originating works☆18Mar 2, 2021Updated 4 years ago
- ☆59Sep 25, 2025Updated 4 months ago
- This repo contains code and visualisation for "Robust moving target defence against false data injection attacks in power grids"☆26Dec 8, 2022Updated 3 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- TTCP CAGE Challenge 3☆37Apr 1, 2024Updated last year
- This is a repository of personal studies on "storytelling with data".☆16Jan 28, 2021Updated 5 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- CAGE Challenge 2 with bug fixes, an alternate simplified version and discussion/clarification about gameplay and using this environment.☆52Jan 7, 2026Updated last month
- Code for the paper "Minimum-Delay Adaptation in Non-Stationary Reinforcement Learning via Online High-Confidence Change-Point Detection"☆10Aug 7, 2023Updated 2 years ago
- Gym-based environment for training offensive RL agents. Agents can generalize to unseen scenarios and simulation-trained agents can be de…☆42Sep 20, 2024Updated last year
- ☆22Nov 22, 2025Updated 2 months ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- A projet for simulating the rescue after a disaster☆10Dec 4, 2020Updated 5 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym☆87Feb 23, 2025Updated 11 months ago
- Cyber Operations Research Gym☆111Jun 3, 2024Updated last year
- ☆10Nov 4, 2019Updated 6 years ago
- code for the paper "Adversarial Reinforced Instruction Attacker for Robust Vision-Language Navigation" (TPAMI 2021)☆10Jul 15, 2022Updated 3 years ago
- (TG'2023) Official code for the paper "Revisiting of AlphaStar" (previously called "Rethinking of AlphaStar"). It compares the raw interf…☆10Sep 6, 2021Updated 4 years ago
- Source code for the Joint Shapley values: a measure of joint feature importance☆13Sep 14, 2021Updated 4 years ago
- ♊ Minimal PyTorch Twin Delayed DDPG (TD3) implementation☆10Jun 20, 2021Updated 4 years ago
- Public package to compute translationally and rotationally invariant wavelet-based statistics on images.☆10Aug 25, 2023Updated 2 years ago
- An implementation of the Conflict-Based Search, written in Python 3. This project, however, will support weighted edges and uncertainty r…☆11Jun 13, 2020Updated 5 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- A metric learning method to learn a provably robust Mahalanobis distance☆10Jan 29, 2022Updated 4 years ago
- Reinforcement Learning algorithms for learning IoT interactions.☆15Oct 1, 2021Updated 4 years ago
- Code for abstracting, evaluating, and visualizing Markov Decision Processes.☆10Jan 12, 2017Updated 9 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- Code and some materials from the papers "Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks" (BMVC 20…☆12Nov 23, 2021Updated 4 years ago
- ☆10Mar 10, 2021Updated 4 years ago
- Analysis of data from the videogame/eSport League of Legends☆11Nov 4, 2019Updated 6 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Source files for the 2020 ICAPS Online Summer School Lab on Plan Execution.☆11Oct 16, 2020Updated 5 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated last year