Human cognitive capacities and the needs of human-centric solutions for
...
Security compliance management plays an important role in mitigating ins...
Attacks exploiting human attentional vulnerability have posed severe thr...
This work proposes a new class of proactive attacks called the Informati...
The rapid growth in the number of devices and their connectivity has enl...
Deceptive attacks exploiting the innate and the acquired vulnerabilities...
We prove the existence of Bayesian Nash Equilibrium (BNE) of general-sum...
Lateral movement of advanced persistent threats (APTs) has posed a sever...
We present a new game framework called the duplicity game to design defe...
Modern control systems are featured by their hierarchical structure comp...
The increasing instances of advanced attacks call for a new defense para...
This paper considers a class of N-person discrete-time dynamic games wit...
The honeynet is a promising active cyber defense mechanism. It reveals t...
Advanced Persistent Threats (APTs) have recently emerged as a significan...
Deception is a technique to mislead human or computer systems by manipul...
Advanced Persistent Threats (APTs) have created new security challenges ...
Security challenges accompany the efficiency. The pervasive integration ...