Picture for Laszlo Erdodi

Laszlo Erdodi

Simulating SQL Injection Vulnerability Exploitation Using Q-Learning Reinforcement Learning Agents

Add code
Jan 08, 2021
Figure 1 for Simulating SQL Injection Vulnerability Exploitation Using Q-Learning Reinforcement Learning Agents
Figure 2 for Simulating SQL Injection Vulnerability Exploitation Using Q-Learning Reinforcement Learning Agents
Viaarxiv icon

Stack-based Buffer Overflow Detection using Recurrent Neural Networks

Add code
Dec 30, 2020
Figure 1 for Stack-based Buffer Overflow Detection using Recurrent Neural Networks
Figure 2 for Stack-based Buffer Overflow Detection using Recurrent Neural Networks
Figure 3 for Stack-based Buffer Overflow Detection using Recurrent Neural Networks
Figure 4 for Stack-based Buffer Overflow Detection using Recurrent Neural Networks
Viaarxiv icon

Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning

Add code
May 26, 2020
Figure 1 for Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning
Figure 2 for Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning
Figure 3 for Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning
Figure 4 for Modeling Penetration Testing with Reinforcement Learning Using Capture-the-Flag Challenges and Tabular Q-Learning
Viaarxiv icon