Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Towards a cognitive theory of cyber deception
This work is an initial step toward develo** a cognitive theory of cyber deception. While
widely studied, the psychology of deception has largely focused on physical cues of …
widely studied, the psychology of deception has largely focused on physical cues of …
[HTML][HTML] Designing effective masking strategies for cyberdefense through human experimentation and cognitive models
Masking strategies for cyberdefense (ie, disguising network attributes to hide the real state of
the network) are predicted to be effective in simulated experiments. However, it is unclear …
the network) are predicted to be effective in simulated experiments. However, it is unclear …
Provable space discretization based evolutionary search for scalable multi-objective security games
In the field of security, multi-objective security games (MOSGs) allow defenders to
simultaneously protect targets from multiple heterogeneous attackers. MOSGs aim to …
simultaneously protect targets from multiple heterogeneous attackers. MOSGs aim to …
[PDF][PDF] Adaptive cyber deception: Cognitively informed signaling for cyber defense
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber
defense using the insights emerging from a cognitive model of human cognition. One …
defense using the insights emerging from a cognitive model of human cognition. One …
Adaptive cyberdefense with deception: A human–ai cognitive approach
Achieving a level of dynamic and adaptive autonomy in cyber defense is highly desirable to
advance the capabilities of cyber defense to a whole new level of effectiveness. In such a …
advance the capabilities of cyber defense to a whole new level of effectiveness. In such a …
[PDF][PDF] Scalable Game-Focused Learning of Adversary Models: Data-to-Decisions in Network Security Games.
Many real-world security problems present the challenge of how to allocate limited
resources to large number of important targets, including infrastructure [14], transportation …
resources to large number of important targets, including infrastructure [14], transportation …
To signal or not to signal: Exploiting uncertain real-time information in signaling games for security and sustainability
Motivated by real-world deployment of drones for conservation, this paper advances the
state-of-the-art in security games with signaling. The well-known defender-attacker security …
state-of-the-art in security games with signaling. The well-known defender-attacker security …
Learning to defend by attacking (and vice-versa): Transfer of learning in cybersecurity games
Designing cyber defense systems to account for cognitive biases in human decision making
has demonstrated significant success in improving performance against human attackers …
has demonstrated significant success in improving performance against human attackers …
Cognitive modeling for personalized, adaptive signaling for cyber deception
This chapter presents an overview of the use of cognitive models for personalized adaptive
signaling for cyber deception. It provides a general introduction to cognitive modeling …
signaling for cyber deception. It provides a general introduction to cognitive modeling …
Exploiting bounded rationality in risk-based cyber camouflage games
Recent works have growingly shown that Cyber deception can effectively impede the
reconnaissance efforts of intelligent cyber attackers. Recently proposed models to optimize …
reconnaissance efforts of intelligent cyber attackers. Recently proposed models to optimize …