Initial Reflections on the Use of Augmented Cognition in Derailing the Kill Chain

[1]  Timothy Taylor,et al.  On the Verges of Overconfidence , 2015 .

[2]  Khaled M. Rabie,et al.  Detection of advanced persistent threat using machine-learning correlation analysis , 2018, Future Gener. Comput. Syst..

[3]  J. Kruger,et al.  Unskilled and unaware of it: how difficulties in recognizing one's own incompetence lead to inflated self-assessments. , 1999, Journal of personality and social psychology.

[4]  José M. Fernandez,et al.  Survey of publicly available reports on advanced persistent threat actors , 2018, Comput. Secur..

[5]  Sui Huang,et al.  When peers are not peers and don't know it: The Dunning‐Kruger effect and self‐fulfilling prophecy in peer‐review , 2013, BioEssays : news and reviews in molecular, cellular and developmental biology.

[6]  D. Eagleman Human time perception and its illusions , 2008, Current Opinion in Neurobiology.

[7]  Gary McGraw Security Fatigue? Shift Your Paradigm , 2014, Computer.

[8]  Dijiang Huang,et al.  A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.

[9]  Kevin C. Desouza,et al.  Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack , 2019, Comput. Secur..

[10]  Kristian Beckers,et al.  Analysis of Social Engineering Threats with Attack Graphs , 2014, DPM/SETOP/QASA.

[11]  E. Uhlmann,et al.  Is research in social psychology politically biased? Systematic empirical tests and a forecasting survey to address the controversy , 2018, Journal of Experimental Social Psychology.

[12]  R. Trivers,et al.  The evolution and psychology of self-deception. , 2011, The Behavioral and brain sciences.

[13]  L. Allan The perception of time , 1979 .

[14]  T. Aven The Concept of Antifragility and its Implications for the Practice of Risk Analysis , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[15]  Steven Furnell,et al.  Recognising and addressing ‘security fatigue’ , 2009 .

[16]  A. Nijholt,et al.  Conclusion: Moving Forward in Brain-Computer Interfaces , 2018 .

[17]  J. Aschoff Human Perception of Short and Long Time Intervals: Its Correlation with Body Temperature and the Duration of Wake Time , 1998, Journal of biological rhythms.

[18]  Michael Workman,et al.  Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security , 2008, J. Assoc. Inf. Sci. Technol..

[19]  Simon Haykin,et al.  Artificial Intelligence Communicates With Cognitive Dynamic System for Cybersecurity , 2019, IEEE Transactions on Cognitive Communications and Networking.

[20]  David Dunning,et al.  How unaware are the unskilled? Empirical tests of the “signal extraction” counterexplanation for the Dunning–Kruger effect in self-evaluation of performance , 2013 .

[21]  Roope Raisamo,et al.  Human augmentation: Past, present and future , 2019, Int. J. Hum. Comput. Stud..