Pinned Repositories
Addaptive-Honeypot-System
Addaptive Honeypot System include SDN with floodlight controller and IDS using DNN
adtrees-1
Python package for manipulating attack-defense trees.
AI-Security-Paper
This resource mainly counts papers related to APT attacks, including APT traceability, APT knowledge graph construction, APT malicious sample detection, and APT overview. Hope these summarized papers are helpful to you~
AIDA-Framework
A framework for the Analysis of Intrusion Detection Alerts
ARO-Foureye
This is a project funded by US Army Research Office (W91NF-2020140). In this project, we develop a hypergame-theoretic defensive deception framework for tactical networks characterized by severe resource constraints, high operational tempo, or high hostility based on the learning and subjective beliefs of attackers and a defender.
csle
A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, reinforcement learning, optimization, evolutionary methods, and causal inference.
dl-based-intrusion-detection-for-iot
Game-theory
Collection of computational algorithms in Game theory
MarkovGameSolvers
This is code for finding the minimax/nash/stackelberg strategy of players in Markov Games.
SciencePlots
Format Matplotlib for scientific plotting
wumingruiye's Repositories
wumingruiye/Game-theory
Collection of computational algorithms in Game theory
wumingruiye/MarkovGameSolvers
This is code for finding the minimax/nash/stackelberg strategy of players in Markov Games.
wumingruiye/SciencePlots
Format Matplotlib for scientific plotting
wumingruiye/adtrees-1
Python package for manipulating attack-defense trees.
wumingruiye/awesome-industrial-control-system-security
A curated list of resources related to Industrial Control System (ICS) security.
wumingruiye/cas-adaptive-resilient-system
wumingruiye/CSE591-Multi-Robot-Surveilance
Project for Multi-Robot-Surveilance
wumingruiye/Finding-the-Rumor-Source
Designed message passing algorithms(Rumor centrality and Jordan centrality) to locate the source of a rumor in a given network
wumingruiye/handson-ml
A series of Jupyter notebooks that walk you through the fundamentals of Machine Learning and Deep Learning in python using Scikit-Learn and TensorFlow.
wumingruiye/Markov-Game-Model
Replying simulations for the research article "Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks" (https://arxiv.org/abs/1812.09660)
wumingruiye/MarkovSoccerGame
Implementing different learning algorithms and analyzing their performance in a Markov game model called the Soccer Game
wumingruiye/mininet
Emulator for rapid prototyping of Software Defined Networks
wumingruiye/mitre-attack-scraper
Web scraper + html parser/inserter for custom Visa-wiki templates
wumingruiye/mitre_analysis
Mitre Attack analysis using Network Science
wumingruiye/PhishingGame
modélisation du phishing basée sur la théorie des jeux pour prédire la prochaine attaque du phisher
wumingruiye/pyhtmm
A Python implementation of Hidden Topic Markov Model
wumingruiye/SDN-with-Honeypots-as-an-Intrusion-Defense-Scheme-for-Botnet-based-DDoS-attacks
An SDN based security system for Botnet based DDoS attacks.
wumingruiye/sharelatex
A web-based collaborative LaTeX editor
wumingruiye/Simulate_GTM-CSec
Simulation script of game theory model for cloud security based on IDS and honeypot.
wumingruiye/StackelbergEquilibribumSolvers
Solves a Mixed Integer Linear Program to generate the Stacklberg Equilibrium of a General-sum (+Bayesian) Games.