Alert button
Picture for Peter Beling

Peter Beling

Alert button

A Systems-Theoretical Formalization of Closed Systems

Add code
Bookmark button
Alert button
Nov 16, 2023
Niloofar Shadab, Tyler Cody, Alejandro Salado, Peter Beling

Viaarxiv icon

Active Learning with Combinatorial Coverage

Add code
Bookmark button
Alert button
Feb 28, 2023
Sai Prathyush Katragadda, Tyler Cody, Peter Beling, Laura Freeman

Figure 1 for Active Learning with Combinatorial Coverage
Figure 2 for Active Learning with Combinatorial Coverage
Figure 3 for Active Learning with Combinatorial Coverage
Figure 4 for Active Learning with Combinatorial Coverage
Viaarxiv icon

Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain

Add code
Bookmark button
Alert button
Nov 06, 2022
Lanxiao Huang, Tyler Cody, Christopher Redino, Abdul Rahman, Akshay Kakkar, Deepak Kushwaha, Cheng Wang, Ryan Clark, Daniel Radke, Peter Beling, Edward Bowen

Figure 1 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 2 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 3 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Figure 4 for Exposing Surveillance Detection Routes via Reinforcement Learning, Attack Graphs, and Cyber Terrain
Viaarxiv icon

Core and Periphery as Closed-System Precepts for Engineering General Intelligence

Add code
Bookmark button
Alert button
Aug 04, 2022
Tyler Cody, Niloofar Shadab, Alejandro Salado, Peter Beling

Figure 1 for Core and Periphery as Closed-System Precepts for Engineering General Intelligence
Figure 2 for Core and Periphery as Closed-System Precepts for Engineering General Intelligence
Viaarxiv icon

Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs

Add code
Bookmark button
Alert button
Jan 28, 2022
Tyler Cody, Abdul Rahman, Christopher Redino, Lanxiao Huang, Ryan Clark, Akshay Kakkar, Deepak Kushwaha, Paul Park, Peter Beling, Edward Bowen

Figure 1 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 2 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 3 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Figure 4 for Discovering Exfiltration Paths Using Reinforcement Learning with Attack Graphs
Viaarxiv icon

Real Time Strategy Language

Add code
Bookmark button
Alert button
Jan 21, 2014
Roy Hayes, Peter Beling, William Scherer

Viaarxiv icon