Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
deception
biblio
You’ve Been Deceived about Deception Technology
Submitted by willirn1 on Wed, 09/25/2019 - 2:41pm
Cognitive Security in Cyber
Cognitive Security
deception
biblio
How to use deception to gain the advantage over cyber-attackers
Submitted by willirn1 on Wed, 09/25/2019 - 2:37pm
Cognitive Security in Cyber
Cognitive Security
deception
biblio
Deception As a Strategy for Cyber Security
Submitted by willirn1 on Wed, 09/25/2019 - 2:31pm
Cognitive Security in Cyber
Cognitive Security
deception
biblio
Tricking attackers through the art of deception
Submitted by willirn1 on Wed, 09/25/2019 - 2:27pm
Cognitive Security in Cyber
Cognitive Security
cyber attackers
deception
biblio
What is Deception Technology?
Submitted by willirn1 on Tue, 09/24/2019 - 2:30pm
Cognitive Security
Cognitive Security in Cyber
deception
Deception Technology
biblio
5 ways deception tech is disrupting cybersecurity
Submitted by willirn1 on Tue, 09/24/2019 - 2:18pm
Cognitive Security
Cognitive Security in Cyber
deception
Cybersecurity
biblio
Advanced Deception: How It Works & Why Attackers Hate It
Submitted by willirn1 on Tue, 09/24/2019 - 2:11pm
Cognitive Security
Cognitive Security in Cyber
deception
biblio
Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy
Submitted by willirn1 on Tue, 09/24/2019 - 2:08pm
Cognitive Security
Cognitive Security in Cyber
deception
defense
biblio
Consistent Deception vs. a Malicious Hacker
Submitted by willirn1 on Tue, 09/24/2019 - 1:48pm
Cognitive Security
Cognitive Security in Cyber
deception
Hacking
biblio
Learning about Cyber Deception through Simulations: Predictions of Human Decision Making with Deceptive Signals in Stackelberg Security Games
Submitted by Katie Dey on Mon, 09/09/2019 - 9:36pm
ACT-R
Algorithm
Articles for Review
C3E 2019
Cognitive Architecture
Cognitive Security
Computer simulation
deception
Instance-based learning
Mind
Cognitive Security
Articles for Review
C3E 2019
« first
‹ previous
1
2
3
4
5
6
next ›
last »