{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T04:14:59Z","timestamp":1778732099948,"version":"3.51.4"},"reference-count":55,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:00:00Z","timestamp":1775692800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000183","name":"US Army Research Office","doi-asserted-by":"publisher","award":["W911NF-18-1-0288"],"award-info":[{"award-number":["W911NF-18-1-0288"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Artificial Intelligence"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.artint.2026.104540","type":"journal-article","created":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T08:53:14Z","timestamp":1775897594000},"page":"104540","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Decision-theoretic planning and cognitive modeling for active cyber deception"],"prefix":"10.1016","volume":"356","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7926-9365","authenticated-orcid":false,"given":"Aditya","family":"Shinde","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9042-9131","authenticated-orcid":false,"given":"Prashant","family":"Doshi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.artint.2026.104540_bib0001","first-page":"1","article-title":"Emerging technology analysis : deception techniques and technologies create security technology business opportunities","author":"Pingree","year":"2018","journal-title":"Trapx Secur."},{"issue":"2","key":"10.1016\/j.artint.2026.104540_bib0002","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","article-title":"The honeynet project: trapping the hackers","volume":"1","author":"Spitzner","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"10.1016\/j.artint.2026.104540_bib0003","series-title":"2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015","first-page":"317","article-title":"A deception based approach for defeating OS and service fingerprinting","author":"Albanese","year":"2015"},{"key":"10.1016\/j.artint.2026.104540_bib0004","series-title":"Decision and Game Theory for Security: Third International Conference, GameSec 2012, Budapest, Hungary, November 5\u20136, 2012. Proceedings 3","first-page":"201","article-title":"Game theoretic model of strategic honeypot selection in computer networks","author":"P\u00edbil","year":"2012"},{"issue":"3","key":"10.1016\/j.artint.2026.104540_bib0005","doi-asserted-by":"crossref","first-page":"3438","DOI":"10.1109\/TNSM.2022.3179965","article-title":"Honeypot allocation for cyber deception under uncertainty","volume":"19","author":"Anwar","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.artint.2026.104540_bib0006","series-title":"Cyber Deception","author":"Jajodia","year":"2016"},{"key":"10.1016\/j.artint.2026.104540_bib0007","series-title":"Judgment under Uncertainty: Heuristic and Biases","author":"Kahneman","year":"1982"},{"issue":"4157","key":"10.1016\/j.artint.2026.104540_bib0008","doi-asserted-by":"crossref","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","article-title":"Judgment under uncertainty: heuristics and biases: biases in judgments reveal some heuristics of thinking under uncertainty","volume":"185","author":"Tversky","year":"1974","journal-title":"Science"},{"issue":"1","key":"10.1016\/j.artint.2026.104540_bib0009","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1257\/mic.2.1.1","article-title":"A theory of deception","volume":"2","author":"Ettinger","year":"2010","journal-title":"Am. Econ. Jo. Microecon."},{"issue":"7","key":"10.1016\/j.artint.2026.104540_bib0010","doi-asserted-by":"crossref","DOI":"10.1111\/cogs.13013","article-title":"Towards a cognitive theory of cyber deception","volume":"45","author":"Cranford","year":"2021","journal-title":"Cogn. Sci."},{"key":"10.1016\/j.artint.2026.104540_bib0011","series-title":"30th USENIX Security Symposium (USENIX Security 21)","first-page":"1127","article-title":"Examining the efficacy of decoy-based and psychological cyber deception","author":"Ferguson-Walter","year":"2021"},{"key":"10.1016\/j.artint.2026.104540_bib0012","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1613\/jair.1579","article-title":"A framework for sequential planning in multi-agent settings","volume":"24","author":"Gmytrasiewicz","year":"2005","journal-title":"J. Artif. Intell. Res."},{"issue":"4","key":"10.1016\/j.artint.2026.104540_bib0013","article-title":"Decision making in complex multiagent contexts: a tale of two frameworks","volume":"33","author":"Doshi","year":"2012","journal-title":"AI Mag."},{"key":"10.1016\/j.artint.2026.104540_bib0014","series-title":"AIPS","first-page":"130","article-title":"Dynamic programming for POMDPs using a factored state representation","author":"Hansen","year":"2000"},{"issue":"2\u20133","key":"10.1016\/j.artint.2026.104540_bib0015","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1023\/A:1008699807402","article-title":"Algebric decision diagrams and their applications","volume":"10","author":"Bahar","year":"1997","journal-title":"Formal Methods Syst. Des."},{"key":"10.1016\/j.artint.2026.104540_bib0016","series-title":"Technical Report","article-title":"Mitre Att&ck: Design and Philosophy","author":"Strom","year":"2018"},{"key":"10.1016\/j.artint.2026.104540_bib0017","series-title":"Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.65109\/BCAI3249","article-title":"Cyber attack intent recognition and active deception using factored interactive pomdps","author":"Shinde","year":"2021"},{"key":"10.1016\/j.artint.2026.104540_bib0018","series-title":"Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent Systems","doi-asserted-by":"crossref","first-page":"1718","DOI":"10.65109\/FAGH3926","article-title":"Modeling cognitive biases in decision-theoretic planning for active cyber deception","author":"Shinde","year":"2024"},{"issue":"4","key":"10.1016\/j.artint.2026.104540_bib0019","first-page":"82","article-title":"Decision making in complex multiagent settings: a tale of two frameworks","volume":"33","author":"Doshi","year":"2012","journal-title":"AI Mag."},{"key":"10.1016\/j.artint.2026.104540_bib0020","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"1814","article-title":"Towards applying interactive POMDPs to real-world adversary modeling","volume":"Vol. 24","author":"Ng","year":"2010"},{"key":"10.1016\/j.artint.2026.104540_bib0021","series-title":"A Complex Game of Cat and Mouse","first-page":"18","author":"Meissner","year":"2011"},{"key":"10.1016\/j.artint.2026.104540_bib0022","series-title":"2009 International Conference on Computational Science and Engineering","first-page":"109","article-title":"A trust-based multiagent system","volume":"Vol. 3","author":"Seymour","year":"2009"},{"key":"10.1016\/j.artint.2026.104540_bib0023","series-title":"Twenty-Second International FLAIRS Conference","article-title":"Responding to sneaky agents in multi-agent domains","author":"Seymour","year":"2009"},{"key":"10.1016\/j.artint.2026.104540_bib0024","series-title":"Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: Volume 1","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.65109\/DRXM6775","article-title":"Modeling recursive reasoning by humans using empirically informed interactive POMDPs","author":"Doshi","year":"2010"},{"issue":"1","key":"10.1016\/j.artint.2026.104540_bib0025","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1002\/bdm.717","article-title":"Levels of theory-of-mind reasoning in competitive games","volume":"25","author":"Goodie","year":"2012","journal-title":"J. Behav. Decis. Mak."},{"key":"10.1016\/j.artint.2026.104540_bib0026","unstructured":"D. Dennett, Intentional Systems, Brainstorms1986."},{"key":"10.1016\/j.artint.2026.104540_bib0027","series-title":"AAAI","first-page":"63","article-title":"Generalized point based value iteration for interactive POMDPs","author":"Doshi","year":"2008"},{"key":"10.1016\/j.artint.2026.104540_bib0028","series-title":"Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems","first-page":"1025","article-title":"Exact solutions of interactive POMDPs using behavioral equivalence","author":"Rathnasabapathy","year":"2006"},{"key":"10.1016\/j.artint.2026.104540_bib0029","series-title":"Advances in Experimental Social Psychology","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/S0065-2601(08)60357-3","article-title":"The intuitive psychologist and his shortcomings: distortions in the attribution process","volume":"Vol. 10","author":"Ross","year":"1977"},{"issue":"2","key":"10.1016\/j.artint.2026.104540_bib0030","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1162\/qjec.2008.123.2.577","article-title":"Coarse thinking and persuasion","volume":"123","author":"Mullainathan","year":"2008","journal-title":"Q. J. Econ."},{"issue":"2","key":"10.1016\/j.artint.2026.104540_bib0031","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1037\/1089-2680.2.2.175","article-title":"Confirmation bias: a ubiquitous phenomenon in many guises","volume":"2","author":"Nickerson","year":"1998","journal-title":"Rev. Gen. Psychol."},{"key":"10.1016\/j.artint.2026.104540_bib0032","series-title":"Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems","doi-asserted-by":"crossref","first-page":"871","DOI":"10.65109\/ZNUC7626","article-title":"Extended goal recognition: a planning-based model for strategic deception","author":"Masters","year":"2021"},{"key":"10.1016\/j.artint.2026.104540_bib0033","series-title":"Fifth Annual IEEE SMC Workshop on Information Assurance","first-page":"116","article-title":"Honeyfiles:deceptive files for intrusion deception","author":"Yuill","year":"2004"},{"key":"10.1016\/j.artint.2026.104540_bib0034","series-title":"Sixth European Conference on Planning","first-page":"99","article-title":"Approximate planning for factored POMDPs","author":"Feng","year":"2014"},{"key":"10.1016\/j.artint.2026.104540_bib0035","series-title":"Exploiting Structure to Efficiently Solve Large Scale Partially Observable Markov Decision Processes","author":"Poupart","year":"2005"},{"key":"10.1016\/j.artint.2026.104540_bib0036","series-title":"Proceedings of Uncertainty in Artificial Intelligence (UAI). Stockholm, Sweden","first-page":"279","article-title":"SPUDD: stochastic planning using decision diagrams","author":"Jesse Hoey","year":"1999"},{"key":"10.1016\/j.artint.2026.104540_bib0037","series-title":"Reasoning About Knowledge","author":"Fagin","year":"2004"},{"key":"10.1016\/j.artint.2026.104540_bib0038","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/s001820050111","article-title":"Interactive epistemology I: knowledge","volume":"28","author":"Aumann","year":"1999","journal-title":"Int. J. Game Theory"},{"key":"10.1016\/j.artint.2026.104540_bib0039","series-title":"Workshops at the Thirtieth AAAI Conference on Artificial Intelligence","article-title":"Bayesian Markov games with explicit finite-level types","author":"Chandrasekaran","year":"2016"},{"issue":"1\u20132","key":"10.1016\/j.artint.2026.104540_bib0040","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/0004-3702(94)00012-P","article-title":"Reinforcement learning of non-Markov decision processes","volume":"73","author":"Whitehead","year":"1995","journal-title":"Artif. Intell."},{"key":"10.1016\/j.artint.2026.104540_bib0041","series-title":"Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research","author":"Maynor","year":"2011"},{"key":"10.1016\/j.artint.2026.104540_bib0042","unstructured":"O. Setayeshfar, C. Adkins, M. Jones, K.H. Lee, P. Doshi, GrAALF: Supporting Graphical Analysis of Audit Logs for Forensics, (2019). arXiv: 1909.00902."},{"key":"10.1016\/j.artint.2026.104540_bib0043","series-title":"Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS","first-page":"892","article-title":"Deceiving cyber adversaries: a game theoretic approach","volume":"vol. 2","author":"Schlenker","year":"2018"},{"issue":"5","key":"10.1016\/j.artint.2026.104540_bib0044","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1007\/BF00935665","article-title":"On the stackelberg strategy in nonzero-sum games","volume":"11","author":"Simaan","year":"1973","journal-title":"J. Optim. Theory Appl."},{"key":"10.1016\/j.artint.2026.104540_bib0045","series-title":"International Conference on Decision and Game Theory for Security","first-page":"228","article-title":"Approximate solutions for attack graph games with imperfect information","author":"Durkota","year":"2015"},{"issue":"10","key":"10.1016\/j.artint.2026.104540_bib0046","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1002\/sec.242","article-title":"A game theoretic investigation of deception in network security","volume":"4","author":"Carroll","year":"2011","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.artint.2026.104540_bib0047","series-title":"International Conference on Decision and Game Theory for Security","first-page":"273","article-title":"Manipulating adversary\u2019s belief: a dynamic game approach to deception by design for proactive network security","author":"Hor\u00e1k","year":"2017"},{"key":"10.1016\/j.artint.2026.104540_bib0048","series-title":"Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security","first-page":"4","article-title":"Game theory for adaptive defensive cyber deception","author":"Ferguson-Walter","year":"2019"},{"key":"10.1016\/j.artint.2026.104540_bib0049","doi-asserted-by":"crossref","DOI":"10.1155\/2015\/570639","article-title":"Hypergame theory: a model for conflict, misperception, and deception","volume":"2015","author":"Kovach","year":"2015","journal-title":"Game Theor."},{"key":"10.1016\/j.artint.2026.104540_bib0050","series-title":"Proceedings of the AAAI Conference on Artificial Intelligence","first-page":"1816","article-title":"POMDPs make better hackers: accounting for uncertainty in penetration testing","volume":"vol. 26","author":"Sarraute","year":"2012"},{"key":"10.1016\/j.artint.2026.104540_bib0051","series-title":"Proceedings of the International Conference on Automated Planning and Scheduling","first-page":"235","article-title":"Pomdp+ information-decay: incorporating defender\u2019s behaviour in autonomous penetration testing","volume":"vol. 30","author":"Schwartz","year":"2020"},{"key":"10.1016\/j.artint.2026.104540_bib0052","unstructured":"T. Microsoft Defender Research, CyberBattleSim, 2021. (https:\/\/github.com\/microsoft\/cyberbattlesim) Created by Christian Seifert, Michael Betser, William Blum, James Bono, Kate Farris, Emily Goren, Justin Grana, Kristian Holsheimer, Brandon Marken, Joshua Neil, Nicole Nichols, Jugal Parikh, Haoran Wei."},{"key":"10.1016\/j.artint.2026.104540_bib0053","unstructured":"C. Baillie, M. Standen, J. Schwartz, M. Docking, D. Bowman, J. Kim, Cyborg: an autonomous cyber operations research gym, (2020). arXiv preprint arXiv: 2002.10667."},{"key":"10.1016\/j.artint.2026.104540_bib0054","series-title":"Decision and Game Theory for Security: 11th International Conference, GameSec 2020, College Park, MD, USA, October 28\u201330, 2020, Proceedings 11","first-page":"103","article-title":"Exploiting bounded rationality in risk-based cyber camouflage games","author":"Thakoor","year":"2020"},{"key":"10.1016\/j.artint.2026.104540_bib0055","series-title":"Technical Report","article-title":"The Tularosa Study: An Experimental Design and Implementation to Quantify the Effectiveness of Cyber Deception","author":"Ferguson-Walter","year":"2018"}],"container-title":["Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0004370226000664?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0004370226000664?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T04:03:35Z","timestamp":1778731415000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0004370226000664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":55,"alternative-id":["S0004370226000664"],"URL":"https:\/\/doi.org\/10.1016\/j.artint.2026.104540","relation":{},"ISSN":["0004-3702"],"issn-type":[{"value":"0004-3702","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Decision-theoretic planning and cognitive modeling for active cyber deception","name":"articletitle","label":"Article Title"},{"value":"Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.artint.2026.104540","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"104540"}}