Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC
☆24Sep 24, 2019Updated 6 years ago
Alternatives and similar repositories for Ludus
Users that are interested in Ludus are comparing it to the libraries listed below
Sorting:
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- Deception and Moving Target Defense with Network Attack Simulation Paper Code☆14Dec 13, 2022Updated 3 years ago
- ÜberDig - dig on steroids☆16Mar 4, 2026Updated 2 weeks ago
- ☆16Nov 8, 2019Updated 6 years ago
- Code for "Convergence of Learning Dynamics in Stackelberg Games"☆13Nov 6, 2019Updated 6 years ago
- ☆12Aug 22, 2019Updated 6 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 11 months ago
- Seamless .onion and tor-ified git remotes☆28Sep 28, 2019Updated 6 years ago
- A Matlab Toolbox for Cooperative Game Theory☆45Feb 15, 2025Updated last year
- Code for my Master's thesis, game theory for adversarial autonomous vehicle platooning scenarios☆14Apr 28, 2023Updated 2 years ago
- Check security aspects of a second-level domain name.☆18May 31, 2024Updated last year
- The three algorithms used to solve Bayesian Stackelberg Games have been implemented here.☆29Aug 9, 2018Updated 7 years ago
- A fully decentralized platform to trade energy between suppliers and generators.☆10Oct 23, 2018Updated 7 years ago
- Lua binding to the nDPI library using the LuaJIT FFI☆16Nov 5, 2020Updated 5 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Paper list of federated learning: About system design☆13Apr 13, 2022Updated 3 years ago
- An android app which converts text/voice input to American Sign Language(ASL)☆14Sep 8, 2016Updated 9 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- 📱 🚑 Dr.Monka is a mobile app which promotes tele consulting which includes text and video chat.☆14Dec 16, 2021Updated 4 years ago
- live subtitles on a chroma key☆21Feb 16, 2026Updated last month
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- 2019 Fall - Game theory and Multi-agent RL Termproject☆10Dec 13, 2019Updated 6 years ago
- ☂️ Protect your short URLs with Google Safe Browsing☆17May 30, 2022Updated 3 years ago
- 用户埋点行为日志分析平台,项目主要用于搭建基于Flink、Apache Doris、Redis和MySQL等中间件的用户行为日志收集、存储、分析平台,支持用户自定义查询条件☆12Dec 28, 2023Updated 2 years ago
- ☆28Mar 24, 2023Updated 2 years ago
- This is an Android based application using Firebase. Use to fix an appointment with any doctor and can search for symptoms for any diseas…☆13Feb 9, 2022Updated 4 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Applying blockchain into P2P Lending platform☆18Oct 11, 2018Updated 7 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- This is the official repository for "DiffSG: A Generative Solver for Network Optimization with Diffusion Model" and "Diffusion Models as …☆19Feb 10, 2025Updated last year
- CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop☆15Dec 11, 2024Updated last year