Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Sunny Fugate"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031263682
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e3e43b412af85d4c8001981ff2b916cb
https://doi.org/10.1007/978-3-031-26369-9_2
https://doi.org/10.1007/978-3-031-26369-9_2
Publikováno v:
Proceedings of the Annual Hawaii International Conference on System Sciences.
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 63:427-431
We report on whether cyber attacker behaviors contain decision making biases. Data from a prior experiment were analyzed in an exploratory fashion, making use of think-aloud responses from a small group of red teamers. The analysis provided new obser
Publikováno v:
HICSS
Autor:
Kimberly Ferguson-Walter, Mark Bilinski, Brian Souza, Ryan Gabrys, Joseph diVita, Sunny Fugate, Justin Mauger
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030903695
GameSec
GameSec
Prior work has explored the use of defensive cyber deception to manipulate the information available to attackers and to proactively misinform on behalf of both real and decoy systems. Such approaches can provide advantages to defenders by detecting
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3f34463b36fc1eff489a056b7813a98f
https://doi.org/10.1007/978-3-030-90370-1_8
https://doi.org/10.1007/978-3-030-90370-1_8
Publikováno v:
HICSS
Autor:
Kimberly Ferguson-Walter, Mark Bilinski, Brian Souza, Sunny Fugate, Joe diVita, Ryan Gabrys, Justin Mauger
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030647926
GameSec
GameSec
Prior work has explored the use of defensive cyber deception to manipulate the information available to attackers and to proactively lie on behalf of both real and decoy systems. Such approaches can provide advantages to defenders by delaying attacke
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::64624f6c735606d7303a02e340d62bdf
https://doi.org/10.1007/978-3-030-64793-3_5
https://doi.org/10.1007/978-3-030-64793-3_5
Publikováno v:
Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 62:272-276
Inverting human factors can aid in cyber defense by flipping well-known guidelines and using them to de-grade and disrupt the performance of a cyber attacker. There has been significant research on how we perform cyber defense tasks and how we should
Publikováno v:
CIC
The human side of cyber is fundamentally important to understanding and improving cyber operations. With the exception of Capture the Flag (CTF) exercises, cyber testing and experimentation tends to ignore the human attacker. While traditional CTF ev