Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Physiological Response to Cyber and Psychological Deception., , , and . HICSS, page 964-973. ScholarSpace, (2024)Informing Autonomous Deception Systems with Cyber Expert Performance Data., , , and . CoRR, (2021)Security in the Industrial Internet of Things - The C-SEC Approach., , , , , and . IoTBD, page 421-428. SciTePress, (2016)The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment., , , , and . CIC, page 346-353. IEEE, (2019)Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration., , , , , and . COMPLEXIS, page 43-52. SCITEPRESS, (2020)Game theory for adaptive defensive cyber deception., , , and . HotSoS, page 4:1-4:8. ACM, (2019)An Approach to Organizational Cybersecurity., , , , , , , , and . ES, volume 10131 of Lecture Notes in Computer Science, page 203-222. Springer, (2015)Creating Cyber Deception Games., , , and . CogMI, page 102-111. IEEE, (2019)Examining the Efficacy of Decoy-based and Psychological Cyber Deception., , , and . USENIX Security Symposium, page 1127-1144. USENIX Association, (2021)Emotional State Classification and Related Behaviors Among Cyber Attackers., , , , , , , and . HICSS, page 846-855. ScholarSpace, (2023)