Accepted Papers

Are Cyber Attackers Thinking Fast and Slow? Exploratory Analysis Reveals Evidence of Decision-Making Biases in Red Teamers

Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape

AI-based Sound-Squatting Attack Made Possible