Towards a cognitive theory of cyber deception
This work is an initial step toward developing a cognitive theory of cyber deception. While
widely studied, the psychology of deception has largely focused on physical cues of …
widely studied, the psychology of deception has largely focused on physical cues of …
[HTML][HTML] Designing effective masking strategies for cyberdefense through human experimentation and cognitive models
Masking strategies for cyberdefense (ie, disguising network attributes to hide the real state of
the network) are predicted to be effective in simulated experiments. However, it is unclear …
the network) are predicted to be effective in simulated experiments. However, it is unclear …
SpeedyIBL: A comprehensive, precise, and fast implementation of instance-based learning theory
Instance-based learning theory (IBLT) is a comprehensive account of how humans make
decisions from experience during dynamic tasks. Since it was first proposed almost two …
decisions from experience during dynamic tasks. Since it was first proposed almost two …
Adaptive cyberdefense with deception: A human–ai cognitive approach
Achieving a level of dynamic and adaptive autonomy in cyber defense is highly desirable to
advance the capabilities of cyber defense to a whole new level of effectiveness. In such a …
advance the capabilities of cyber defense to a whole new level of effectiveness. In such a …
Making predictions without data: How an instance-based learning model predicts sequential decisions in the balloon analog risk task
EH Bugbee, C Gonzalez - Proceedings of the annual meeting of …, 2022 - escholarship.org
Many models in Cognitive Science require data to calibrate parameters. Some modelers
calibrate their models' parameters for each individual in a data set, and others work at the …
calibrate their models' parameters for each individual in a data set, and others work at the …
Exploiting bounded rationality in risk-based cyber camouflage games
Recent works have growingly shown that Cyber deception can effectively impede the
reconnaissance efforts of intelligent cyber attackers. Recently proposed models to optimize …
reconnaissance efforts of intelligent cyber attackers. Recently proposed models to optimize …
Decoys in cybersecurity: an exploratory study to test the effectiveness of 2-sided deception
One of the widely used cyber deception techniques is decoying, where defenders create
fictitious machines (ie, honeypots) to lure attackers. Honeypots are deployed to entice …
fictitious machines (ie, honeypots) to lure attackers. Honeypots are deployed to entice …
[PDF][PDF] Speedyibl: A solution to the curse of exponential growth in instance-based learning models of decisions from experience
Computational cognitive modeling is a useful methodology to explore and validate theories
of human cognitive processes. Often cognitive models are used to simulate the process by …
of human cognitive processes. Often cognitive models are used to simulate the process by …
Learning and dynamic decision making
C Gonzalez - Topics in Cognitive Science, 2022 - Wiley Online Library
Humans make decisions in dynamic environments (increasingly complex, highly uncertain,
and changing situations) by searching for potential alternatives sequentially over time, to …
and changing situations) by searching for potential alternatives sequentially over time, to …
[HTML][HTML] Human Factors in Cybersecurity, Vol. 127, 2024, 115–126 AHFE
P Aggarwal¹, S Venkatesan, J Youzwak… - Human Factors in …, 2024 - books.google.com
Understanding a cyber attacker's behavior can help improve cyber defenses. However,
currently, there are no substantial publicly available datasets to learn about attackers' …
currently, there are no substantial publicly available datasets to learn about attackers' …