4,169 research outputs found
Recommended from our members
An Empirical Assessment of the Effectiveness of Deception for Cyber Defense
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for sophisticated cyber defense techniques. The Tularosa Study, was designed and conducted to understand how defensive deception, both cyber and psychological, affects cyber attackers Ferguson-Walter et al. [2019c]. More specifically, for this empirical study, cyber deception refers to a decoy system and psychological deception refers to false information of the presence of defensive deception techniques on the network. Over 130 red teamers participated in a network penetration test over two days in which we controlled both the presence of and explicit mention of deceptive defensive techniques. To our knowledge, this represents the largest study of its kind ever conducted on a skilled red team population. In addition to the abundant host and network data collected, we conducted a battery of questionnaires, e.g., experience, personality; and cognitive tasks, e.g., fluid intelligence, working memory; as well as physiological measures, e.g., galvanic skin response (GSR), heart rate, to be correlated with the cyber events at a later date. The design and execution of this study and the lessons learned are a major contribution of this thesis. I investigate the effectiveness of decoy systems for cyber defense by comparing performance across all experimental conditions. Results support a new finding that the combination of the presence of deception and the true information that deception is present has the greatest effect on cyber attackers, when compared to a control condition in which no deception was used. Evidence of cognitive biases in the red teamersâ behavior is then detailed and explained, to further support our theory of oppositional human factors (OHF). The final chapter discusses how elements of the experimental design contribute to the validity of assessing the effectiveness of cyber deception and reviews trade-offs and lessons learned
4-Methyl-2,6-bis(phosphonomethyl)phenol dihydrate
The 4-methyl-2,6-bis(phosphomethyl)phenol molecule,
which crystallizes with two water molecules per asymmetric
unit, has approximate twofold symmetry and is
involved in extensive three-dimensional hydrogen bonding
in which every available OH group participates.
The principal dimensions include P--O 1.4981 (13)
and 1.5015 (14) ,~, four P--OH distances in the range
1.5395(14) to 1.5688(13) A, P--C 1.7857(17) and
1.7893 (17) ~k, and O...O intramolecular and intermolecular
hydro.gen-bond distances in the range 2.458 (2) to
2.866 (2) A
Concert recording 2019-04-10
[Track 1]. Un dia de Noviembre / Leo Brouwer -- [Track 2]. Histoire du tango. I. Bordell [Track 3]. II. Cafe / Astor Piazzolla -- [Track 4]. Body and solo / Johnny Green arrange by Gustavo Samor -- [Track 5]. There will never be another you / Harry Warren -- [Track 6]. Recordame (Recuerdame) / Joe Henderson
Responsible Integration of Behavioral Science in Computer Science Research and Development
Cross disciplinary research is essential for technological innovation. For decades, computer science (Comp Sci) has leveraged behavior science (Behav Sci) research to create innovative products and improve end user experience. Despite the natural challenges that come with cross disciplinary work, there are no published manuscripts outlining how to responsibly integrate Behav Sci into Comp Sci research and development. This publication fills this critical gap by discussing important differences between Behav Sci and Comp Sci, particularly with regard to how each field fits under the umbrella of science and how each field conceptualizes data. We then discuss the consequences of misusing Behav Sci and provide examples of technology efforts that drew inappropriate or unethical conclusions about their behavioral data. We discuss in detail common errors to avoid at each stage of the research process, which we condensed into a useful checklist to use as a tool for teams integrating Behav Sci in their work. Finally, we include examples of good applications of Behav Sci into Comp Sci research, the design of which can inform and strengthen digital government, e-commerce, defense, and many other areas of information technology
3-(Benzo[b]thien-2-yl)-5,6-dihydro-1,4,2-oxathiazine 4-Oxide
The title compound, CââHâNOâSâ, is a potent material preservative and contains the 1,4,2-oxathiazine ring system in a half-chair conformation with the methylene C atoms 0.510 (3) and -0.367 (3) Ă
from the plane of the other four oxathiazine ring atoms
- âŠ