Research Papers

Learning to Defend by Attacking (and Vice-Versa): Transfer Learning in Cyber-Security Games

Honey Infiltrator: Injecting Honeytoken Using Netfilter

How well does GPT phish people? An investigation involving cognitive biases and feedback

Research Proposals

Towards In-situ Psychological Profiling of Attackers Using Dynamically Generated Deception Environments – A Proof-of-Concept Proposal

Decision-Making Biases in Cybersecurity: Measuring the Impact of the Sunk Cost Fallacy to Delay Attacker Behavior