Linked e-resources
Details
Table of Contents
1. Diversifying Deception: Game Theoretic Models for Two-Sided and Layered Deception
2. Human-Subject Experiments on Risk-based Cyber Camouflage Games
3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach
4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception
5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms
6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning
7. Mee: Adaptive Honeyfile System for Insider Attacker Detection
8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
9. Using Amnesia to Detect Credential Database Breaches
10. Deceiving ML-Based Friend-or-Foe Identification for Executables.
2. Human-Subject Experiments on Risk-based Cyber Camouflage Games
3. Adaptive Cyberdefense with Deception: A Human-AI Cognitive Approach
4. Cognitive Modeling for Personalized, Adaptive Signaling for Cyber Deception
5. Deceptive Signaling: Understanding Human Behavior against Signaling algorithms
6. Optimizing Honey Traffic Using Game Theory and Adversarial Learning
7. Mee: Adaptive Honeyfile System for Insider Attacker Detection
8. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
9. Using Amnesia to Detect Credential Database Breaches
10. Deceiving ML-Based Friend-or-Foe Identification for Executables.