search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webinar Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Thomas G. Podnar
Thomas Podnar
Software Engineering Institute
All
Tech Publications
Blog Posts
Podcasts
Videos
ML-Driven Decision-Making in Realistic Cyber Exercises
October 20, 2022
•
Podcast
By
Dustin D. Updyke
,
Thomas G. Podnar
Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations
April 11, 2022
• By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
Traditional and Advanced Techniques for Network Beacon Detection
February 1, 2022
•
Video
By
Dustin D. Updyke
,
Thomas G. Podnar
Using Machine Learning to Increase NPC Fidelity
December 1, 2021
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
Foundation of Cyber Ranges
May 19, 2021
•
Technical Report
By
Thomas G. Podnar
,
Geoffrey B. Dobson
,
Dustin D. Updyke
,
Bill Reed
More from Thomas Podnar
Using Machine Learning to Increase NPC Fidelity
December 1, 2021
•
Technical Report
By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
Foundation of Cyber Ranges
May 19, 2021
•
Technical Report
By
Thomas G. Podnar
,
Geoffrey B. Dobson
,
Dustin D. Updyke
,
Bill Reed
GHOSTS in the Machine: A Framework for Cyber-Warfare Exercise NPC Simulation
December 3, 2018
•
Technical Report
By
Dustin D. Updyke
,
Geoffrey B. Dobson
,
Thomas G. Podnar
,
Luke J. Osterritter
,
Benjamin L. Earl
,
Adam D. Cerini
R-EACTR: A Framework for Designing Realistic Cyber Warfare Exercises
September 29, 2017
•
Technical Report
By
Geoffrey B. Dobson
,
Thomas G. Podnar
,
Adam D. Cerini
,
Luke J. Osterritter
More from Thomas Podnar
Using Machine Learning to Increase the Fidelity of Non-Player Characters in Training Simulations
April 11, 2022
• By
Dustin D. Updyke
,
Thomas G. Podnar
,
Geoffrey B. Dobson
,
John Yarger
More from Thomas Podnar
ML-Driven Decision-Making in Realistic Cyber Exercises
October 20, 2022
•
Podcast
By
Dustin D. Updyke
,
Thomas G. Podnar
More from Thomas Podnar
Traditional and Advanced Techniques for Network Beacon Detection
February 1, 2022
•
Video
By
Dustin D. Updyke
,
Thomas G. Podnar
More from Thomas Podnar
Send a Message