01Assess zero-day vulnerability tail risk using extreme value theory
02Optimize security resource allocation using Colonel Blotto game theory
03Simulate attack-defense as a partially observable stochastic game
040 GitHub stars
05Synthesize multi-step exploit chains via AND-OR graph A* search
06Predict vulnerability emergence using Hawkes process