Subject: Psychology | Review | cognitive modeling | behavioral simulations | human factors | network simulations | embedded cognition | BF1-990 | cyber-security | training effectiveness | model tracing
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-se... View more
Abbasi Y. D.Short M.Sinha A.Sintov N.Zhang C.Tambe M. (2015). Human adversaries in opportunistic crime security games: evaluating competing bounded rationality models, in Third Annual Confe rence on Advances in Cognitive Systems ACS-2015. Atlanta, GA.
Aggarwal P.Gonzalez C.Dutt V. (2016). Cyber-security: role of deception in cyber-attack detection, in Advances in Intelligent Systems and Computing, vol. 501 (Orlando, FL: Springer), 85–96.
Alpcan T.Başar T. (2010). Network Security: A Decision and Game-Theoretic Approach. Cambridge, UK: Cambridge University Press.
Altmann E. M.Trafton J. G. (2002). Memory for goals: an activation-based model. Cogn. Sci.
26, 39–83. 10.1207/s15516709cog2601_2
Anderson J. R. (2007). How Can the Human Mind Occur in the Physical Universe?
Oxford series on cognitive models and architectures. Oxford; New York: Oxford University Press.
Anderson J. R.Corbett A. T.Koedinger K. R.Pelletier R. (1995). Cognitive tutors: lessons learned. J. Learn. Sci.
4, 167–207. 10.1207/s15327809jls0402_2
Anderson J. R.Lebiere C. (1998). The Atomic Components of Thought. Mahwah, NJ: Lawrence Erlbaum Associates Publishers.
Arora A.Dutt V. (2013). cyber-security : evaluating the effects of attack strategy and base rate through instance - based learning, in Proceedings of the 12th International Conference on Cognitive Modeling, ICCM 2013 (Ottawa, ON), 336–341.
Ball J.Myers C.Heiberg A.Cooke N. J.Matessa M.Freiman M. (2010). The synthetic teammate project. Comput. Math. Organ. Theory
Barham P.Dragovic B.Fraser K.Hand S.Harris T.Ho A. (2003). Xen and the art of virtualization, in ACM SIGOPS Operating Systems Review, vol. 37 (Bolton Landing, NY: ACM), 164–177.