Masking strategies for cyberdefense (ie, disguising network attributes to hide the real state of the network) are predicted to be effective in simulated experiments. However, it is unclear …
Instance-based learning theory (IBLT) is a comprehensive account of how humans make decisions from experience during dynamic tasks. Since it was first proposed almost two …
Achieving a level of dynamic and adaptive autonomy in cyber defense is highly desirable to advance the capabilities of cyber defense to a whole new level of effectiveness. In such a …
EH Bugbee, C Gonzalez - Proceedings of the annual meeting of …, 2022 - escholarship.org
Many models in Cognitive Science require data to calibrate parameters. Some modelers calibrate their models' parameters for each individual in a data set, and others work at the …
Recent works have growingly shown that Cyber deception can effectively impede the reconnaissance efforts of intelligent cyber attackers. Recently proposed models to optimize …
One of the widely used cyber deception techniques is decoying, where defenders create fictitious machines (ie, honeypots) to lure attackers. Honeypots are deployed to entice …
Computational cognitive modeling is a useful methodology to explore and validate theories of human cognitive processes. Often cognitive models are used to simulate the process by …
C Gonzalez - Topics in Cognitive Science, 2022 - Wiley Online Library
Humans make decisions in dynamic environments (increasingly complex, highly uncertain, and changing situations) by searching for potential alternatives sequentially over time, to …
Understanding a cyber attacker's behavior can help improve cyber defenses. However, currently, there are no substantial publicly available datasets to learn about attackers' …