Login / Signup
Automated Post-Breach Penetration Testing through Reinforcement Learning.
Sujita Chaudhary
Austin O'Brien
Shengjie Xu
Published in:
CNS (2020)
Keyphrases
</>
reinforcement learning
penetration testing
security vulnerabilities
website
case study
open source
hardware and software