Research Papers
Modeling a Cyber Deception Practitioner’s Approach: Behaviorally Exploiting an American Cybercriminal with Warranting Theory and Whaley’s Unpublished Work on “Unexpected Players”
- Tim Pappa, Walmart Global Tech
Application Layer Cyber Deception without Developer Interaction
- Mario Kahlhofer, Dynatrace Research
- Stefan Rass, Johannes Kepler University Linz , LIT Secure and Correct Systems Lab
LLM in the Shell: Generative Honeypots
- Muris Sladić, Czech Technical University in Prague
- Veronica Valeros, Czech Technical University in Prague
- Carlos Catania, School of Engineering, UNCuyo Argentina
- Sebastian García, Czech Technical University in Prague
- Tillmann Angeli, German Research Center for Artificial Intelligence GmbH
- Daniel Reti, German Research Center for Artificial Intelligence GmbH
- Daniel Schneider, German Research Center for Artificial Intelligence GmbH
- Hans D. Schotten, University of Kaiserslautern (RPTU) Germany, German Research Center for Artificial Intelligence GmbH
Redundant Position-based Rogue Access Point Detection
- Wenjie Liu, KTH Royal Institute of Technology
- Panos Papadimitratos, KTH Royal Institute of Technology
Game Theoretic Framework for Multi Domain Cyber Deception
- Ahmed Hemida, DEVCOM Army Research Laboratory
- Ahmad Bilal Asghar, DEVCOM Army Research Laboratory
- Jon Kleinberg, Cornell University
- Charles Kamhoua, DEVCOM Army Research Laboratory