Login / Signup

Automated Post-Breach Penetration Testing through Reinforcement Learning.

Sujita ChaudharyAustin O'BrienShengjie Xu
Published in: CNS (2020)
Keyphrases
  • reinforcement learning
  • penetration testing
  • security vulnerabilities
  • website
  • case study
  • open source
  • hardware and software