Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users
Computational models of cognitive processes may be employed in cyber-security tools,
experiments, and simulations to address human agency and effective decision-making in …
experiments, and simulations to address human agency and effective decision-making in …
Effects of cyber security knowledge on attack detection
Ensuring cyber security is a complex task that relies on domain knowledge and requires
cognitive abilities to determine possible threats from large amounts of network data. This …
cognitive abilities to determine possible threats from large amounts of network data. This …
Human factor security: evaluating the cybersecurity capacity of the industrial workforce
Purpose As cyber-attacks continue to grow, organisations adopting the internet-of-things
(IoT) have continued to react to security concerns that threaten their businesses within the …
(IoT) have continued to react to security concerns that threaten their businesses within the …
Opportunities and challenges for human-machine teaming in cybersecurity operations
Many of the challenges associated with cybersecurity operations are also ripe opportunities
for the application of human-machine teaming. Advances in cognitive science, artificial …
for the application of human-machine teaming. Advances in cognitive science, artificial …
Creative persuasion: a study on adversarial behaviors and strategies in phishing attacks
Success of phishing attacks depend on effective exploitation of human weaknesses. This
research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior …
research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior …
Exploiting the human factor: Social engineering attacks on cryptocurrency users
Social engineering is one of the preferred methods used by criminals to gain unauthorized
access to information and information systems. Social engineering targets especially the …
access to information and information systems. Social engineering targets especially the …
Toward personalized deceptive signaling for cyber defense using cognitive models
Recent research in cybersecurity has begun to develop active defense strategies using
game‐theoretic optimization of the allocation of limited defenses combined with deceptive …
game‐theoretic optimization of the allocation of limited defenses combined with deceptive …
Cognitive models in cybersecurity: learning from expert analysts and predicting attacker behavior
Cybersecurity stands to benefit greatly from models able to generate predictions of attacker
and defender behavior. On the defender side, there is promising research suggesting that …
and defender behavior. On the defender side, there is promising research suggesting that …
[PDF][PDF] Ontology-based Adaptive Systems of Cyber Defense.
In this paper we outline a holistic approach for understanding and simulating human
decision making in knowledge-intensive tasks. To this purpose, we integrate semantic and …
decision making in knowledge-intensive tasks. To this purpose, we integrate semantic and …
What makes phishing emails hard for humans to detect?
This research investigates the email features that make a phishing email difficult to detect by
humans. We use an existing data set of phishing and ham emails and expand that data set …
humans. We use an existing data set of phishing and ham emails and expand that data set …