Detection of Reverse Engineering Activities Before the Attack

Koney: A Cyber Deception Orchestration Framework for Kubernetes

Experience Paper: Uncovering a Privileged Insider Threat in Action

VelLMes: A high-interaction AI-based deception framework

A Case Study on the Use of Representativeness Bias as a Defense Against Adversarial Cyber Threats

Cognitive Biases in Cyber Attacker Decision-Making: Translating Behavioral Insights into Cybersecurity

Position Paper: The Extended Pyramid of Pain: The Attacker’s Nightmare Edition

Towards bio-inspired cyber-deception: a case study of SSH and Telnet honeypots