Pinned Repositories
Addaptive-Honeypot-System
Addaptive Honeypot System include SDN with floodlight controller and IDS using DNN
adtrees-1
Python package for manipulating attack-defense trees.
AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
AIDA-Framework
A framework for the Analysis of Intrusion Detection Alerts
ARO-Foureye
This is a project funded by US Army Research Office (W91NF-2020140). In this project, we develop a hypergame-theoretic defensive deception framework for tactical networks characterized by severe resource constraints, high operational tempo, or high hostility based on the learning and subjective beliefs of attackers and a defender.
csle
A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
dl-based-intrusion-detection-for-iot
Game-theory
Collection of computational algorithms in Game theory
MarkovGameSolvers
This is code for finding the minimax/nash/stackelberg strategy of players in Markov Games.
SciencePlots
Format Matplotlib for scientific plotting
wumingruiye's Repositories
wumingruiye/AttackMarker
Precdict APT using Bayesian attack graph(vldb)
wumingruiye/csle
A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
wumingruiye/Addaptive-Honeypot-System
Addaptive Honeypot System include SDN with floodlight controller and IDS using DNN
wumingruiye/AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
wumingruiye/AIDA-Framework
A framework for the Analysis of Intrusion Detection Alerts
wumingruiye/ARO-Foureye
This is a project funded by US Army Research Office (W91NF-2020140). In this project, we develop a hypergame-theoretic defensive deception framework for tactical networks characterized by severe resource constraints, high operational tempo, or high hostility based on the learning and subjective beliefs of attackers and a defender.
wumingruiye/automated-security-assessment
wumingruiye/awesome-graph-attack-papers
Adversarial attacks and defenses on Graph Neural Networks.
wumingruiye/Blackwell-Strategy
Python implementation of the Blackwell strategy for regret minimization in finite strategic games
wumingruiye/canarytokens
Canarytokens helps track activity and actions on your network.
wumingruiye/codebase
MARL-Book's official codebase repo. www.marl-book.com
wumingruiye/CRUSOE
CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop
wumingruiye/gambit
Gambit
wumingruiye/Graduation-Project
This Code is Our Graduation project. Intelligent HoneyPot on SDN
wumingruiye/Hornets-Nest
Purple Team Security
wumingruiye/inspyred
Python library for bio-inspired computational intelligence
wumingruiye/matrix_game_analysis
wumingruiye/MatTuGames
A Matlab Toolbox for Cooperative Game Theory
wumingruiye/minicps
MiniCPS: a framework for Cyber-Physical Systems real-time simulation, built on top of mininet
wumingruiye/mirror
Robust Reinforcement Learning Under Minimax Regret for Green Security (UAI-21)
wumingruiye/NASIM-MTD
Deception and Moving Target Defense with Network Attack Simulation Paper Code
wumingruiye/papers-we-love
Papers from the computer science community to read and discuss.
wumingruiye/PATRL
wumingruiye/reinforcement-learning
Implementation of Reinforcement Learning Algorithms. Python, OpenAI Gym, Tensorflow. Exercises and Solutions to accompany Sutton's Book and David Silver's course.
wumingruiye/SAGE
[TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854
wumingruiye/SCANTRAP
WordPress Security Plugin
wumingruiye/shap
A game theoretic approach to explain the output of any machine learning model.
wumingruiye/SMET
SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity
wumingruiye/SPGLS
wumingruiye/SPT-MTD