Ersatzpasswords: Ending password cracking and detecting password leakage, pp.311-320, 2015. ,
Planning and Integrating Deception into Computer, Proceedings of the New Security Paradigms Workshop, 2014. ,
Complex Strategic Analysis: A Hypergame Study of the Fall of France, Journal of the Operational Research Society, vol.30, issue.1, pp.23-32, 1979. ,
Toward A Theory of Hypergames, Omega, vol.5, issue.6, pp.749-751, 1977. ,
HYPANT : A Hypergame Analysis Tool Monash University, 2003. ,
, Conflict analysis: Models and Resolutions. North-Holland series in system science and engineering, 1984.
Applied Hypergame Theory for Network Defense ,
A Hypergame Model for Information Security, International Journal of Information Security Science, vol.3, issue.1, pp.148-155, 2014. ,
Honeywords: Making Password-cracking Detectable, Proceedings of Computer & Communications Security, p.13, 2013. ,
Game theoretic model of strategic honeypot selection in computer networks, Proceedings of GameSec, pp.201-220, 2012. ,
, Hot Knives Through Butter: Evading File-based Sandboxes. FireEye, 2014.
Honeypots: Tracking Hackers, 2002. ,
A Procedure for Analyzing Hypergames, European Journal of Operational Research, vol.18, pp.111-122, 1984. ,
, , pp.90268-90274
Modeling Misperceptions in Games, Behavioral Science, vol.33, issue.3, pp.207-223, 1988. ,
Honeyfiles: deceptive files for intrusion detection, IEEE SMC Information Assurance Workshop, pp.116-122, 2004. ,