Author of the publication

Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games.

, , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 103-124. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Cyber Situational Awareness in a Cyber Security Game involving., , , and . Int. J. Cyber Situational Aware., 3 (1): 11-38 (2018)Evidence of Cognitive Biases in Cyber Attackers from An Empirical Study., , , and . HICSS, page 934-943. ScholarSpace, (2024)How People Make Decisions Based on Prior Experience: Formulas of Instance-Based Learning Theory (IBLT) Follow from Scale Invariance., , , and . NAFIPS, volume 751 of Lecture Notes in Networks and Systems, page 312-319. Springer, (2023)Truth-Telling in a Sender-Receiver Game: Social Value Orientation and Incentives., , , and . Symmetry, 14 (8): 1561 (2022)Learning About the Effects of Alert Uncertainty in Attack and Defend Decisions via Cognitive Modeling., , , and . Hum. Factors, 64 (2): 343-358 (2022)Exploiting Bounded Rationality in Risk-Based Cyber Camouflage Games., , , , , and . GameSec, volume 12513 of Lecture Notes in Computer Science, page 103-124. Springer, (2020)Looking from the hacker's perspective: Role of deceptive strategies in cyber security., , and . CyberSA, page 1-6. IEEE, (2016)How well does GPT phish people? An investigation involving cognitive biases and feedback., , , and . EuroS&P Workshops, page 451-457. IEEE, (2023)Modeling the effects of amount and timing of deception in simulated network scenarios., , and . CyberSA, page 1-7. IEEE, (2017)Design of Dynamic and Personalized Deception: A Research Framework and New Insights., , , and . HICSS, page 1-10. ScholarSpace, (2020)