Eric Yocam's repositories
obfuscation_techniques_poc
Demonstrates of eight common code obfuscation techniques
cnn_hnn_comparison_analysis_poc
A comparison analysis between classical and quantum-classical (or hybrid) neural network and the impact effectiveness of a compound adversarial attack.
gen_dga_regex_and_yara_rules_poc
A demonstration of domain generation algorithm (DGA) and determing regular expression and yara rule for each dga.
cyber_ops_analysis_tools_technique_poc
A comprehensive mapping of the Cyber Kill Chain and MITRE ATT&CK frameworks to various tools and techniques commonly used in malware analysis, reverse engineering, and software exploitation analysis.
iot_device_firmware_analysis_poc
Performs firmware analysis on a given binary file.
Optimal_Stock_Selec_Monte_Carlo_SIM
Performs a comprehensive analysis of a stock portfolio using historical data, Monte Carlo simulations, and various financial metrics. It aims to identify the optimal stock from a given portfolio based on risk-adjusted returns.
quantum-circuit-anomaly-detection-poc
A quantum anomaly detection approach using the Cirq and Pennylane libraries, designed to detect adversarial attacks on quantum circuits.
synthetic_network_traffic_simulation_poc
A simulation of network traffic using synthetic network traffic for 802.11, 3G GSM, 4G LTE, and 5G NR
analysis_bin_exploit_mem_corrupt_poc
An analysis of binary explotation memory corruption vulnerabilities.
access_control_demo_poc
Demonstrates six key access control concepts.
bgp-routing-attacks-sim-poc
Simulates the Border Gateway Protocol (BGP) routing process and demonstrates two common BGP attacks: sub-prefix hijacking and BGP prepending.
crypto_and_security_principles_poc
Demonstrates key concepts in cryptography and security principles.
cyber-domain-tools-ref-poc
Cyber analysis tools used in different domains of cybersecurity.
detect_bias_in_nn_classifiers_GANs_delphi_poc
Implements a Delphi of GANs approach to detect bias in pre-trained language models and provides a novel way to assess and compare bias levels in different models across multiple dimensions such as gender, racial, and age bias
encrypt_aes_keys_with_lattice_sig_poc
Demonstrates a combination of 2D-Discrete Wavelet Transform (2D-DWT) with post-quantum cryptographic techniques, including a simulated version of the Falcon signature algorithm, for securing images.
encrypt_aes_keys_with_lwe_poc
Demonstrates a multi-level encryption approach for securing images by combining traditional cryptographic techniques with post-quantum encryption methods.
find_random_point_in_circle_diff_meth_poc
Compares four different methods for generating uniformly distributed random points within a unit circle
fuzzy-logic-applied-routing-qos-poc
Fuzzy Logic Enhanced Network Traffic Routing with QoS
gan_mnist_gen_all_digits_poc
Generative Adversarial Network to generate handwritten digit images similar to the MNIST dataset.
gencyber_10_sec_principles_poc
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
GIS_unemploy_interactive_poc
Creates an interactive visualization of unemployment data for Washington and California State counties. It combines geographical data with unemployment statistics to produce a choropleth map and a detailed table.
igave_toolkit_poc
The X-Force IGAVE Toolkit is a Python-based application that provides a visualization demonstration of various concepts related to innovation, market adoption, and emerging technologies.
key_exchanges_demo_poc
Demonstrates basic cryptographic concepts using simplified implementations of Diffie-Hellman and RSA algorithms.
opt_LRU_cache_perf_poc
Cache replacement algorithms, including Least Recently Used (LRU), First In First Out (FIFO), and Enhanced Not Recently Used (ENRU).
post_quantum_falcon_crypto_sig_poc
Python implementation of the FALCON (Fast Fourier Lattice-based Compact Signatures over NTRU) post-quantum signature algorithm.
quantinuum-hnn-compound-adv-attack-poc
A quantum-classical (or hybrid) neural network and the use of a adversarial attack mechanism. The core libraries employed are Quantinuum pytket and pytket-qiskit. torchattacks is used for the white-box, targetted, compounded adversarial attacks.
quantum-circuit-logical-gates-poc
Demonstrates the implementation of various logical gates using quantum circuits. The code utilizes three popular quantum computing libraries: Cirq, PyQuil, and ProjectQ.
quantum_computation_refresher_poc
A comprehensive refresher on the fundamental concepts and principles of quantum computation
simple-language-model-creation-poc
A language model that generates text based on a given prompt.
simple_web_development_poc
Simple demonstration of basic fundamentals with HTML, CSS, JavaScript