icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
Dustin D. Updyke
Dustin D. Updyke
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
Videos
Self-Assessment in Training and Exercise
October 24, 2024
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
John Yarger
,
Sean Huff
Simulating Realistic Human Activity Using Large Language Model Directives
October 2, 2023
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Sean Huff
ML-Driven Decision-Making in Realistic Cyber Exercises
October 20, 2022
•
Podcast
By
Dustin D. Updyke
,
Thomas G. Podnar
Using Alternate Data Streams in the Collection and Exfiltration of Data
September 19, 2022
•
Blog Post
By
Dustin D. Updyke
,
Molly Jaconski
Trust and AI Systems
August 11, 2022
•
Podcast
By
Carol J. Smith
,
Dustin D. Updyke
More from Dustin Updyke
Self-Assessment in Training and Exercise
October 24, 2024
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
John Yarger
,
Sean Huff
Simulating Realistic Human Activity Using Large Language Model Directives
October 2, 2023
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Sean Huff
Using Machine Learning to Increase NPC Fidelity
December 1, 2021
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
Foundation of Cyber Ranges
May 19, 2021
•
Technical Report
By
Thomas G. Podnar
,
Geoffrey B. Dobson
,
Dustin D. Updyke
,
Bill Reed
GHOSTS in the Machine: A Framework for Cyber-Warfare Exercise NPC Simulation
December 3, 2018
•
Technical Report
By
Dustin D. Updyke
,
Geoffrey B. Dobson
,
Thomas G. Podnar
,
Luke J. Osterritter
,
Benjamin L. Earl
,
Adam D. Cerini
More from Dustin Updyke
Using Alternate Data Streams in the Collection and Exfiltration of Data
September 19, 2022
•
Blog Post
By
Dustin D. Updyke
,
Molly Jaconski
Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations
April 11, 2022
•
Blog Post
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
Generating Realistic Non-Player Characters for Training Cyberteams
April 12, 2021
•
Blog Post
By
Dustin D. Updyke
,
Tyler Brooks
Balancing Cyber Confidence and Privacy Concerns
September 21, 2020
•
Blog Post
By
Bill Reed
,
Dustin D. Updyke
More from Dustin Updyke
ML-Driven Decision-Making in Realistic Cyber Exercises
October 20, 2022
•
Podcast
By
Dustin D. Updyke
,
Thomas G. Podnar
Trust and AI Systems
August 11, 2022
•
Podcast
By
Carol J. Smith
,
Dustin D. Updyke
More from Dustin Updyke
Traditional and Advanced Techniques for Network Beacon Detection
February 1, 2022
•
Video
By
Dustin D. Updyke
,
Thomas G. Podnar
More from Dustin Updyke
Send a Message