Research Papers
Learning to Defend by Attacking (and Vice-Versa): Transfer Learning in Cyber-Security Games
- Tyler Malloy, Carnegie Mellon University
- Cleotilde Gonzalez, Carnegie Mellon University
Honey Infiltrator: Injecting Honeytoken Using Netfilter
- Daniel Reti, German Research Center for Artificial Intelligence GmbH
- Tillmann Angeli, German Research Center for Artificial Intelligence GmbH
- Hans Dieter Schotten, German Research Center for Artificial Intelligence GmbH
How well does GPT phish people? An investigation involving cognitive biases and feedback
- Megha Sharma, Applied Cognitive Science Lab, Indian Institute of Technology Mandi, Kamand, Himachal Pradesh, India
- Palvi Aggarwal, University of Texas El Paso
- Kuldeep Singh, University of Texas El Paso
- Varun Dutt, Applied Cognitive Science Lab, Indian Institute of Technology Mandi, Kamand, Himachal Pradesh, India
Research Proposals
Towards In-situ Psychological Profiling of Attackers Using Dynamically Generated Deception Environments – A Proof-of-Concept Proposal
- Jacob Quibell, Cranfield University
Decision-Making Biases in Cybersecurity: Measuring the Impact of the Sunk Cost Fallacy to Delay Attacker Behavior
- Chelsea Johnson, US Department of Defense