Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC
☆24Sep 24, 2019Updated 6 years ago
Alternatives and similar repositories for Ludus
Users that are interested in Ludus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- ☆14Jul 14, 2018Updated 7 years ago
- ÜberDig - dig on steroids☆16Apr 23, 2026Updated last week
- ☆16Nov 8, 2019Updated 6 years ago
- Code for "Convergence of Learning Dynamics in Stackelberg Games"☆13Nov 6, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- ☆12Aug 22, 2019Updated 6 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated last year
- GSM related documentation☆25Feb 12, 2021Updated 5 years ago
- Check security aspects of a second-level domain name.☆18May 31, 2024Updated last year
- Lua binding to the nDPI library using the LuaJIT FFI☆15Nov 5, 2020Updated 5 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- ☆29Mar 24, 2023Updated 3 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- Wireshark Lua plugin to generate pcapng test capture files☆11Aug 31, 2015Updated 10 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 6 years ago
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 8 months ago
- MISP website (hugo-based)☆25Apr 16, 2026Updated 2 weeks ago
- Sémantický slovník pojmů☆13Apr 2, 2026Updated last month
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Implementing Algorithms for Computing Stackelberg Equilibria in Security Games☆44Apr 1, 2017Updated 9 years ago
- Decentralised Energy Market☆12Feb 19, 2018Updated 8 years ago
- Evolutionary Based Moving Target Cyber-Defense Master Thesis☆12Jan 21, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year
- Factored Interactive POMDP solver based on symbolic Perseus.☆11Aug 12, 2025Updated 8 months ago
- this will be used for attack graph engine MulVAL to evaluate risk assessment results for different network topologies.☆12Feb 23, 2016Updated 10 years ago
- ☆21Jan 20, 2023Updated 3 years ago
- Calculate the number of nuclear reactors needed for the energy wasted by cryptocurrency mining☆11Mar 8, 2025Updated last year
- ☆16Feb 12, 2019Updated 7 years ago
- 💳 ETL (Extract, Transform and Load) pipeline for calculating stats for a transactions database & testing the efficacy of a loyalty prog…☆10Apr 25, 2017Updated 9 years ago