These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

160 related articles for article (PubMed ID: 34213797)

  • 1. Towards a Cognitive Theory of Cyber Deception.
    Cranford EA; Gonzalez C; Aggarwal P; Tambe M; Cooney S; Lebiere C
    Cogn Sci; 2021 Jul; 45(7):e13013. PubMed ID: 34213797
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Toward Personalized Deceptive Signaling for Cyber Defense Using Cognitive Models.
    Cranford EA; Gonzalez C; Aggarwal P; Cooney S; Tambe M; Lebiere C
    Top Cogn Sci; 2020 Jul; 12(3):992-1011. PubMed ID: 32725751
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
    Rao NS; Poole SW; Ma CY; He F; Zhuang J; Yau DK
    Risk Anal; 2016 Apr; 36(4):694-710. PubMed ID: 25847370
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Cyber Security: Effects of Penalizing Defenders in Cyber-Security Games via Experimentation and Computational Modeling.
    Maqbool Z; Aggarwal P; Pammi VSC; Dutt V
    Front Psychol; 2020; 11():11. PubMed ID: 32063872
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.
    Wang W; Di Maio F; Zio E
    Risk Anal; 2019 Dec; 39(12):2766-2785. PubMed ID: 31361041
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Learning About the Effects of Alert Uncertainty in Attack and Defend Decisions via Cognitive Modeling.
    Aggarwal P; Moisan F; Gonzalez C; Dutt V
    Hum Factors; 2022 Mar; 64(2):343-358. PubMed ID: 32954818
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Influence of Network Size on Adversarial Decisions in a Deception Game Involving Honeypots.
    Katakwar H; Aggarwal P; Maqbool Z; Dutt V
    Front Psychol; 2020; 11():535803. PubMed ID: 33117217
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Multistage Attack-Defense Graph Game Analysis for Protection Resources Allocation Optimization Against Cyber Attacks Considering Rationality Evolution.
    Shao C; Li YF
    Risk Anal; 2022 May; 42(5):1086-1105. PubMed ID: 34636067
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.
    King ZM; Henshel DS; Flora L; Cains MG; Hoffman B; Sample C
    Front Psychol; 2018; 9():39. PubMed ID: 29459838
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions.
    Mohan PV; Dixit S; Gyaneshwar A; Chadha U; Srinivasan K; Seo JT
    Sensors (Basel); 2022 Mar; 22(6):. PubMed ID: 35336373
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.
    Veksler VD; Buchler N; Hoffman BE; Cassenti DN; Sample C; Sugrim S
    Front Psychol; 2018; 9():691. PubMed ID: 29867661
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers.
    Moisan F; Gonzalez C
    Front Psychol; 2017; 8():982. PubMed ID: 28690557
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Self-deception in an evolutionary game.
    Byrne CC; Kurland JA
    J Theor Biol; 2001 Oct; 212(4):457-80. PubMed ID: 11597181
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Many faces of rationality: Implications of the great rationality debate for clinical decision-making.
    Djulbegovic B; Elqayam S
    J Eval Clin Pract; 2017 Oct; 23(5):915-922. PubMed ID: 28730671
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cognitive Models in Cybersecurity: Learning From Expert Analysts and Predicting Attacker Behavior.
    Veksler VD; Buchler N; LaFleur CG; Yu MS; Lebiere C; Gonzalez C
    Front Psychol; 2020; 11():1049. PubMed ID: 32612551
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.
    Dutt V; Ahn YS; Gonzalez C
    Hum Factors; 2013 Jun; 55(3):605-18. PubMed ID: 23829034
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Applying Reinforcement Learning for Enhanced Cybersecurity against Adversarial Simulation.
    Oh SH; Jeong MK; Kim HC; Park J
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991711
    [TBL] [Abstract][Full Text] [Related]  

  • 19. To err is human but not deceptive.
    Walczyk JJ; Cockrell NF
    Mem Cognit; 2022 Jan; 50(1):232-244. PubMed ID: 34136972
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.
    Maqbool Z; Makhijani N; Pammi VSC; Dutt V
    Hum Factors; 2017 May; 59(3):420-431. PubMed ID: 28430545
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.