Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users

VD Veksler, N Buchler, BE Hoffman… - Frontiers in …, 2018 - frontiersin.org
Computational models of cognitive processes may be employed in cyber-security tools,
experiments, and simulations to address human agency and effective decision-making in …

Effects of cyber security knowledge on attack detection

N Ben-Asher, C Gonzalez - Computers in Human Behavior, 2015 - Elsevier
Ensuring cyber security is a complex task that relies on domain knowledge and requires
cognitive abilities to determine possible threats from large amounts of network data. This …

Human factor security: evaluating the cybersecurity capacity of the industrial workforce

UD Ani, H He, A Tiwari - Journal of Systems and Information …, 2019 - emerald.com
Purpose As cyber-attacks continue to grow, organisations adopting the internet-of-things
(IoT) have continued to react to security concerns that threaten their businesses within the …

Opportunities and challenges for human-machine teaming in cybersecurity operations

C Lyn Paul, LM Blaha, CK Fallon… - Proceedings of the …, 2019 - journals.sagepub.com
Many of the challenges associated with cybersecurity operations are also ripe opportunities
for the application of human-machine teaming. Advances in cognitive science, artificial …

Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks

P Rajivan, C Gonzalez - Frontiers in psychology, 2018 - frontiersin.org
Success of phishing attacks depend on effective exploitation of human weaknesses. This
research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior …

Exploiting the human factor: Social engineering attacks on cryptocurrency users

K Weber, AE Schütz, T Fertig, NH Müller - … , LCT 2020, Held as Part of the …, 2020 - Springer
Social engineering is one of the preferred methods used by criminals to gain unauthorized
access to information and information systems. Social engineering targets especially the …

Toward personalized deceptive signaling for cyber defense using cognitive models

EA Cranford, C Gonzalez, P Aggarwal… - Topics in Cognitive …, 2020 - Wiley Online Library
Recent research in cybersecurity has begun to develop active defense strategies using
game‐theoretic optimization of the allocation of limited defenses combined with deceptive …

Cognitive models in cybersecurity: learning from expert analysts and predicting attacker behavior

VD Veksler, N Buchler, CG LaFleur, MS Yu… - Frontiers in …, 2020 - frontiersin.org
Cybersecurity stands to benefit greatly from models able to generate predictions of attacker
and defender behavior. On the defender side, there is promising research suggesting that …

[PDF][PDF] Ontology-based Adaptive Systems of Cyber Defense.

N Ben-Asher, A Oltramari, RF Erbacher, C Gonzalez - STIDS, 2015 - stids.c4i.gmu.edu
In this paper we outline a holistic approach for understanding and simulating human
decision making in knowledge-intensive tasks. To this purpose, we integrate semantic and …

What makes phishing emails hard for humans to detect?

K Singh, P Aggarwal, P Rajivan… - Proceedings of the …, 2020 - journals.sagepub.com
This research investigates the email features that make a phishing email difficult to detect by
humans. We use an existing data set of phishing and ham emails and expand that data set …