Introduction to the HICSS-54 minitrack on cyber deception and cyber psychology for defense

被引:0
|
作者
Ferguson-Walter, Kimberly [1 ]
Fugate, Sunny [2 ]
Wang, Cliff [3 ]
Bishop, Matt [4 ]
机构
[1] Laboratory for Advanced Cybersecurity Research
[2] Naval Information Warfare Center, Pacific
[3] Army Research Office
[4] University of California, Davis, United States
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1956 / 1957
相关论文
共 34 条
  • [21] Introduction to the HICSS-53 software development for mobile devices, the internet-of-things, and cyber-physical systems MiniTrack
    Majchrzak, Tim A.
    Grønli, Tor-Morten
    Kaindl, Hermann
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2020, 2020-January : 6629 - 6630
  • [22] Multi-paradigm deception modeling for cyber defense
    De Faveri, Cristiano
    Moreira, Ana
    Amaral, Vasco
    JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 141 : 32 - 51
  • [23] Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim
    Hong, Quan
    Li, Jiaqi
    Guo, Xizhong
    Xie, Pan
    Zhai, Lidong
    DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 224 - 243
  • [24] Asymptotic Security Using Bayesian Defense Mechanism With Application to Cyber Deception
    Sasahara, Hampei
    Sandberg, Henrik
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (08) : 5004 - 5019
  • [25] Three decades of deception techniques in active cyber defense-Retrospect and outlook
    Zhang, Li
    Thing, Vrizlynn. L. L.
    COMPUTERS & SECURITY, 2021, 106
  • [26] Research on active defense based on multi-stage cyber deception game
    Hu, Yongjin
    Ma, Jun
    Guo, Yuanbo
    Zhang, Han
    Tongxin Xuebao/Journal on Communications, 2020, 41 (08): : 32 - 42
  • [27] A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion
    Gao, Chungang
    Wang, Yongjie
    Xiong, Xinli
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
    Steingartner, William
    Galinec, Darko
    Kozina, Andrija
    SYMMETRY-BASEL, 2021, 13 (04):
  • [29] Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures
    Cifranic, Nicholas
    Hallman, Roger A.
    Romero-Mariona, Jose
    Souza, Brian
    Calton, Trevor
    Coca, Giancarlo
    INTERNET OF THINGS, 2020, 12
  • [30] Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
    Ajmal, Abdul Basit
    Alam, Masoom
    Khaliq, Awais Abdul
    Khan, Shawal
    Qadir, Zakria
    Mahmud, M. A. Parvez
    IEEE ACCESS, 2021, 9 : 126789 - 126800