search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Dustin D. Updyke
Dustin Updyke
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
Videos
Simulating Realistic Human Activity Using Large Language Model Directives
October 2, 2023
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Sean Huff
ML-Driven Decision-Making in Realistic Cyber Exercises
October 20, 2022
•
Podcast
By
Dustin D. Updyke
,
Thomas G. Podnar
Using Alternate Data Streams in the Collection and Exfiltration of Data
September 19, 2022
•
Blog Post
By
Dustin D. Updyke
,
Molly Jaconski
Trust and AI Systems
August 11, 2022
•
Podcast
By
Carol J. Smith
,
Dustin D. Updyke
Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations
April 11, 2022
•
Blog Post
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
More from Dustin Updyke
Simulating Realistic Human Activity Using Large Language Model Directives
October 2, 2023
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Sean Huff
Using Machine Learning to Increase NPC Fidelity
December 1, 2021
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
Foundation of Cyber Ranges
May 19, 2021
•
Technical Report
By
Thomas G. Podnar
,
Geoffrey B. Dobson
,
Dustin D. Updyke
,
Bill Reed
GHOSTS in the Machine: A Framework for Cyber-Warfare Exercise NPC Simulation
December 3, 2018
•
Technical Report
By
Dustin D. Updyke
,
Geoffrey B. Dobson
,
Thomas G. Podnar
,
Luke J. Osterritter
,
Benjamin L. Earl
,
Adam D. Cerini
More from Dustin Updyke
Using Alternate Data Streams in the Collection and Exfiltration of Data
September 19, 2022
•
Blog Post
By
Dustin D. Updyke
,
Molly Jaconski
Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations
April 11, 2022
•
Blog Post
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
Generating Realistic Non-Player Characters for Training Cyberteams
April 12, 2021
•
Blog Post
By
Dustin D. Updyke
,
Tyler Brooks
Balancing Cyber Confidence and Privacy Concerns
September 21, 2020
•
Blog Post
By
Bill Reed
,
Dustin D. Updyke
More from Dustin Updyke
ML-Driven Decision-Making in Realistic Cyber Exercises
October 20, 2022
•
Podcast
By
Dustin D. Updyke
,
Thomas G. Podnar
Trust and AI Systems
August 11, 2022
•
Podcast
By
Carol J. Smith
,
Dustin D. Updyke
More from Dustin Updyke
Traditional and Advanced Techniques for Network Beacon Detection
February 1, 2022
•
Video
By
Dustin D. Updyke
,
Thomas G. Podnar
More from Dustin Updyke
Send a Message