Alert button
Picture for Deepak Kushwaha

Deepak Kushwaha

Alert button

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Add code
Bookmark button
Alert button
Nov 06, 2022
Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

Figure 1 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 2 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 3 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 4 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Viaarxiv icon

Lateral Movement Detection Using User Behavioral Analysis

Add code
Bookmark button
Alert button
Aug 29, 2022
Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila

Figure 1 for Lateral Movement Detection Using User Behavioral Analysis
Figure 2 for Lateral Movement Detection Using User Behavioral Analysis
Figure 3 for Lateral Movement Detection Using User Behavioral Analysis
Figure 4 for Lateral Movement Detection Using User Behavioral Analysis
Viaarxiv icon

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

Add code
Bookmark button
Alert button
Jan 28, 2022
Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

Figure 1 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 2 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 3 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 4 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Viaarxiv icon