Initial Reflections on the Use of Augmented Cognition in Derailing the Kill Chain
暂无分享,去创建一个
[1] Timothy Taylor,et al. On the Verges of Overconfidence , 2015 .
[2] Khaled M. Rabie,et al. Detection of advanced persistent threat using machine-learning correlation analysis , 2018, Future Gener. Comput. Syst..
[3] J. Kruger,et al. Unskilled and unaware of it: how difficulties in recognizing one's own incompetence lead to inflated self-assessments. , 1999, Journal of personality and social psychology.
[4] José M. Fernandez,et al. Survey of publicly available reports on advanced persistent threat actors , 2018, Comput. Secur..
[5] Sui Huang,et al. When peers are not peers and don't know it: The Dunning‐Kruger effect and self‐fulfilling prophecy in peer‐review , 2013, BioEssays : news and reviews in molecular, cellular and developmental biology.
[6] D. Eagleman. Human time perception and its illusions , 2008, Current Opinion in Neurobiology.
[7] Gary McGraw. Security Fatigue? Shift Your Paradigm , 2014, Computer.
[8] Dijiang Huang,et al. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.
[9] Kevin C. Desouza,et al. Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack , 2019, Comput. Secur..
[10] Kristian Beckers,et al. Analysis of Social Engineering Threats with Attack Graphs , 2014, DPM/SETOP/QASA.
[11] E. Uhlmann,et al. Is research in social psychology politically biased? Systematic empirical tests and a forecasting survey to address the controversy , 2018, Journal of Experimental Social Psychology.
[12] R. Trivers,et al. The evolution and psychology of self-deception. , 2011, The Behavioral and brain sciences.
[13] L. Allan. The perception of time , 1979 .
[14] T. Aven. The Concept of Antifragility and its Implications for the Practice of Risk Analysis , 2015, Risk analysis : an official publication of the Society for Risk Analysis.
[15] Steven Furnell,et al. Recognising and addressing ‘security fatigue’ , 2009 .
[16] A. Nijholt,et al. Conclusion: Moving Forward in Brain-Computer Interfaces , 2018 .
[17] J. Aschoff. Human Perception of Short and Long Time Intervals: Its Correlation with Body Temperature and the Duration of Wake Time , 1998, Journal of biological rhythms.
[18] Michael Workman,et al. Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security , 2008, J. Assoc. Inf. Sci. Technol..
[19] Simon Haykin,et al. Artificial Intelligence Communicates With Cognitive Dynamic System for Cybersecurity , 2019, IEEE Transactions on Cognitive Communications and Networking.
[20] David Dunning,et al. How unaware are the unskilled? Empirical tests of the “signal extraction” counterexplanation for the Dunning–Kruger effect in self-evaluation of performance , 2013 .
[21] Roope Raisamo,et al. Human augmentation: Past, present and future , 2019, Int. J. Hum. Comput. Stud..