wumingruiye's Stars
hslatman/awesome-threat-intelligence
A curated list of Awesome Threat Intelligence resources
thinkst/canarytokens
Canarytokens helps track activity and actions on your network.
OTRF/OSSEM
Open Source Security Events Metadata (OSSEM)
Limmen/awesome-rl-for-cybersecurity
A curated list of resources dedicated to reinforcement learning applied to cyber security.
bhdresh/Dejavu
DejaVU - Open Source Deception Framework
johnnykv/heralding
Credentials catching honeypot
google-deepmind/symplectic-gradient-adjustment
A colab that implements the Symplectic Gradient Adjustment optimizer from "The mechanics of n-player differentiable games"
RoboticExplorationLab/Algames.jl
ALGAMES: Game Theoretic Solver for Trajectory Optimization
Limmen/gym-idsgame
An Abstract Cyber Security Simulation and Markov Game for OpenAI Gym
TakuyaHiraoka/Multi-Agent-Reinforcement-Learning-in-Stochastic-Games
Unofficial PyBrain extension for multi-agent reinforcement learning in general sum stochastic games.
sailik1991/StackelbergEquilibribumSolvers
Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.
joelparkerhenderson/ooda-loop
OODA loop: notes on John Boyd, strategy, tactics, planning, and paradigms
bwilder0/aaai_melding_code
Code the AAAI 2019 paper "Melding the Data-Decisions Pipeline: Decision-Focused Learning for Combinatorial Optimization"
prismmodelchecker/prism-games
The main development version of the PRISM-games model checker, an extension of PRISM which supports stochastic games.
Limmen/gym-optimal-intrusion-response
A Simulated Optimal Intrusion Response Game
AIandSocialGoodLab/DeDOL
Implementation of DeDOL algorithm - Deep Reinforcement Learning based algorithm for Green Security Games with Real Time Information
fiezt/Stackelberg-Code
Code for "Convergence of Learning Dynamics in Stackelberg Games"
CSIRT-MU/CRUSOE
CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling Inspired by the OODA Loop
facundo-p/Markov-Game-Model
Replying simulations for the research article "Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks" (https://arxiv.org/abs/1812.09660)
mjfarooq/Secure-and-Reconfigurable-Network-Design-for-Critical-Information-Dissemination-in-the-IoBT
System_model_fig
AmaralMA42/Game-Theory
Simple examples of Monte-Carlo Evolutionary Game Theory models
bwilder0/submodular_games
Matrixeigs/fucking-algorithm
刷算法全靠套路,认准 labuladong 就够了!English version supported! Crack LeetCode, not only how, but also why.
josdas/Game-theory
Collection of computational algorithms in Game theory
lucashu1/Social-Network-Coverage
Maximizing coverage in a social network, for USC Teamcore AI Lab
araujof/sharelatex
A web-based collaborative LaTeX editor
shruti-chanumolu/Breakthrough-game-AI
Implemented an Agent to play a simple two player zero sum game Breakthrough
shruti-chanumolu/compsci_687_project
Reinforcement learning
shruti-chanumolu/Social-Networks-as-Graphs
(a) represent social networks as graphs, (b) visualize them using a Python package called NetworkX, and (c) spread information over a social network.
whosec/dracker
Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This application can be used as a honey pot to detect when "users" have opened "honey" docuements in shares they should not have accessed, or it allows you to track sensitive confidential documents within the organisation to see if its being passed around to users not authorised to access the documents.