Search Results for author: Ahmad Ridley

Found 6 papers, 0 papers with code

Proceedings of the 2nd International Workshop on Adaptive Cyber Defense

no code implementations18 Aug 2023 Marco Carvalho, Damian Marriott, Mark Bilinski, Ahmad Ridley

The 2nd International Workshop on Adaptive Cyber Defense was held at the Florida Institute of Technology, Florida.

Proceedings of TDA: Applications of Topological Data Analysis to Data Science, Artificial Intelligence, and Machine Learning Workshop at SDM 2022

no code implementations3 Apr 2022 R. W. R. Darling, John A. Emanuello, Emilie Purvine, Ahmad Ridley

Topological Data Analysis (TDA) is a rigorous framework that borrows techniques from geometric and algebraic topology, category theory, and combinatorics in order to study the "shape" of such complex high-dimensional data.

Topological Data Analysis

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

no code implementations28 Feb 2022 James Holt, Edward Raff, Ahmad Ridley, Dennis Ross, Arunesh Sinha, Diane Staheli, William Streilen, Milind Tambe, Yevgeniy Vorobeychik, Allan Wollaber

These challenges are widely studied in enterprise networks, but there are many gaps in research and practice as well as novel problems in other domains.

Incorporating Deception into CyberBattleSim for Autonomous Defense

no code implementations31 Aug 2021 Erich Walter, Kimberly Ferguson-Walter, Ahmad Ridley

Deceptive elements, including honeypots and decoys, were incorporated into the Microsoft CyberBattleSim experimentation and research platform.

CyberBattleSim reinforcement-learning +1

Network Defense is Not a Game

no code implementations20 Apr 2021 Andres Molina-Markham, Ransom K. Winder, Ahmad Ridley

Hence, we propose to define network defense tasks as distributions of network environments, to: (i) enable research to apply modern AI techniques, such as unsupervised curriculum learning and reinforcement learning for network defense; and, (ii) facilitate the design of well-defined challenges that can be used to compare approaches for autonomous cyberdefense.

reinforcement-learning Reinforcement Learning (RL)

Cannot find the paper you are looking for? You can Submit a new open access paper.