Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

Article English OPEN
Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat;
(2018)

Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-se... View more
  • References (74)
    74 references, page 1 of 8

    Abbasi Y. D.Short M.Sinha A.Sintov N.Zhang C.Tambe M. (2015). Human adversaries in opportunistic crime security games: evaluating competing bounded rationality models, in Third Annual Confe rence on Advances in Cognitive Systems ACS-2015. Atlanta, GA.

    Aggarwal P.Gonzalez C.Dutt V. (2016). Cyber-security: role of deception in cyber-attack detection, in Advances in Intelligent Systems and Computing, vol. 501 (Orlando, FL: Springer), 85–96.

    Alpcan T.Başar T. (2010). Network Security: A Decision and Game-Theoretic Approach. Cambridge, UK: Cambridge University Press.

    Altmann E. M.Trafton J. G. (2002). Memory for goals: an activation-based model. Cogn. Sci. 26, 39–83. 10.1207/s15516709cog2601_2

    Anderson J. R. (2007). How Can the Human Mind Occur in the Physical Universe? Oxford series on cognitive models and architectures. Oxford; New York: Oxford University Press.

    Anderson J. R.Corbett A. T.Koedinger K. R.Pelletier R. (1995). Cognitive tutors: lessons learned. J. Learn. Sci. 4, 167–207. 10.1207/s15327809jls0402_2

    Anderson J. R.Lebiere C. (1998). The Atomic Components of Thought. Mahwah, NJ: Lawrence Erlbaum Associates Publishers.

    Arora A.Dutt V. (2013). cyber-security : evaluating the effects of attack strategy and base rate through instance - based learning, in Proceedings of the 12th International Conference on Cognitive Modeling, ICCM 2013 (Ottawa, ON), 336–341.

    Ball J.Myers C.Heiberg A.Cooke N. J.Matessa M.Freiman M. (2010). The synthetic teammate project. Comput. Math. Organ. Theory 16, 271–299.

    Barham P.Dragovic B.Fraser K.Hand S.Harris T.Ho A. (2003). Xen and the art of virtualization, in ACM SIGOPS Operating Systems Review, vol. 37 (Bolton Landing, NY: ACM), 164–177.

  • Related Organizations (3)
  • Metrics
Share - Bookmark