Detection of Reverse Engineering Activities Before the Attack
- P. Falcarin, M. Venerba, M. De Giorgi, F. Sarro
Koney: A Cyber Deception Orchestration Framework for Kubernetes
- M. Kahlhofer, M. Golinelli, S. Rass
Experience Paper: Uncovering a Privileged Insider Threat in Action
- R. Bhaskaran, R. Gopalakrishna
VelLMes: A high-interaction AI-based deception framework
- M. Sladić, V. Valeros, C. Catania, S. Garcia
A Case Study on the Use of Representativeness Bias as a Defense Against Adversarial Cyber Threats
- B. Hitaj, G. Denker, L. Tinnel, J. Lawson, B. DeBruhl, G. McCain, D. Starink, M. McAnally, D. Aaron, N. Bunting, A. Fafard, R. Roberts”
Cognitive Biases in Cyber Attacker Decision-Making: Translating Behavioral Insights into Cybersecurity
- A. Aggarwal, M. Ferreira, P. Aggarwal, P. Rajivan, C. Gonzalez
Position Paper: The Extended Pyramid of Pain: The Attacker’s Nightmare Edition
- R. Gopalakrishna, R. Bhaskaran
Towards bio-inspired cyber-deception: a case study of SSH and Telnet honeypots
- A. Safargalieva, E. Vasilomanolakis