Research Papers

Modeling a Cyber Deception Practitioner’s Approach: Behaviorally Exploiting an American Cybercriminal with Warranting Theory and Whaley’s Unpublished Work on “Unexpected Players”

Application Layer Cyber Deception without Developer Interaction

LLM in the Shell: Generative Honeypots

False Flavor Honeypot: Deceiving Vulnerability Scanning Tools

Redundant Position-based Rogue Access Point Detection

Game Theoretic Framework for Multi Domain Cyber Deception