Deceptive signaling has proven an effective method that can aid security analysists and deter attacks on unprotected targets by strategically revealing information to an attacker. However, recent research has shown that uncertainty in real-time information processing can have a negative impact on the effectiveness of the defense algorithm. The current research developed a new algorithm, dubbed Confusion Signaling, that aims to account for uncertainty in an abstracted insider attack scenario. The results of cognitive model simulations and a human behavioral experiment reveal interesting and unexpected reactions under uncertainty. We discuss the implications of these findings for signaling algorithms that aim to account for uncertainty using ...
Increasingly, more administrators (defenders) are using defense strategies with deception such as ho...
© 2020 IEEE.This study investigates the relationship between resilience of control systems to attack...
This paper aims to explore the cyber deception- based approach and to design a novel conceptual mode...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
International audienceObjective We aim to learn about the cognitive mechanisms governing the decisio...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
Motivated by real-world deployment of drones for conservation, this paper advances the state-of-the-...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
In this article, we propose a novel method that aims to improve upon existing moving-target defences...
Stackelberg Security Games (SSG) have been widely applied for solving real-world security problems—w...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
We developed a simulation game to study the effectiveness of decision-makers in overcoming two compl...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Increasingly, more administrators (defenders) are using defense strategies with deception such as ho...
© 2020 IEEE.This study investigates the relationship between resilience of control systems to attack...
This paper aims to explore the cyber deception- based approach and to design a novel conceptual mode...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
International audienceObjective We aim to learn about the cognitive mechanisms governing the decisio...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
Motivated by real-world deployment of drones for conservation, this paper advances the state-of-the-...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
In this article, we propose a novel method that aims to improve upon existing moving-target defences...
Stackelberg Security Games (SSG) have been widely applied for solving real-world security problems—w...
Abstract Handling cyber threats unavoidably needs to deal with both uncertain and imprecise informat...
We developed a simulation game to study the effectiveness of decision-makers in overcoming two compl...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Increasingly, more administrators (defenders) are using defense strategies with deception such as ho...
© 2020 IEEE.This study investigates the relationship between resilience of control systems to attack...
This paper aims to explore the cyber deception- based approach and to design a novel conceptual mode...