A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures

H Ahmad, I Dharmadasa, F Ullah, MA Babar - ACM Computing Surveys, 2023 - dl.acm.org
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …

Cyber expert feedback: Experiences, expectations, and opinions about cyber deception

KJ Ferguson-Walter, MM Major, CK Johnson… - Computers & …, 2023 - Elsevier
Human behavior is a critical, yet under-studied topic in cybersecurity. Among the techniques
used for cyber defense, for cyber deception, a better understanding of human perception …

A review of cyber vigilance tasks for network defense

OA Guidetti, C Speelman, P Bouhlas - Frontiers in Neuroergonomics, 2023 - frontiersin.org
The capacity to sustain attention to virtual threat landscapes has led cyber security to
emerge as a new and novel domain for vigilance research. However, unlike classic …

Friend or Faux Deception for Cyber Defense

KJ Ferguson-Walter, DS LaFon, TB Shade - Journal of Information Warfare, 2017 - JSTOR
Defensive deception provides promise in rebalancing the asymmetry of cybersecurity. It
makes an attacker's job harder because it does more than just block access; it impacts the …

An empirical assessment of the effectiveness of deception for cyber defense

KJ Ferguson-Walter - 2024 - scholarworks.umass.edu
The threat of cyber attacks is a growing concern across the world, leading to an increasing
need for sophisticated cyber defense techniques. The Tularosa Study, was designed and …

The WACDT, a modern vigilance task for network defense

OA Guidetti, CP Speelman, P Bouhlas - Frontiers in neuroergonomics, 2023 - frontiersin.org
Vigilance decrement refers to a psychophysiological decline in the capacity to sustain
attention to monotonous tasks after prolonged periods. A plethora of experimental tasks exist …

The cyber simulation terrain: Towards an open source cyber effects simulation ontology

K O'Sullivan, B Turnbull - 2015 - ro.ecu.edu.au
Cyber resilience is characterised by an ability to understand and adapt to changing network
conditions, including cyber attacks. Cyber resilience may be characterised by an effects …

A dual integrated dynamic intrusion detection system (DID-IDS) for protection against network and social engineering attacks

A Bello, H Alashwal, AA Moustafa - Cybersecurity and Cognitive Science, 2022 - Elsevier
Cybercriminals can attack either network systems (using password attacks, IP address
spoofing, or traffic interception methods) or attack the minds of computer system users (using …

[PDF][PDF] Research Online

AM Sullivan - Metabolism - academia.edu
Cyber resilience is characterised by an ability to understand and adapt to changing network
conditions, including cyber attacks. Cyber resilience may be characterised by an effects …

[引用][C] Le leurrage numérique: taxonomie et cadre juridique–une étude de cas suisse

B Wanner, S Ghernaouti