{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:13:34Z","timestamp":1774541614137,"version":"3.50.1"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"3-4","license":[{"start":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T00:00:00Z","timestamp":1741737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Australia-USA MURI","award":["W911NF-20-S-000"],"award-info":[{"award-number":["W911NF-20-S-000"]}]},{"name":"Army Research Laboratory","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Trans. Soc. Comput."],"published-print":{"date-parts":[[2025,12,31]]},"abstract":"<jats:p>Adversary emulation is commonly used to test cyber-defense performance against known threats to organizations. However, many adversary emulation methods often rely on automated planning and underplay the role of human cognition. Consequently, defenders are often underprepared for human attackers who can think creatively and adapt their strategies. In this article, we propose the design of adversarial cognitive agents that are dynamic, adaptable, and able to learn from experience. These cognitive agents are built based on the theoretical principles of Instance-Based Learning Theory (IBLT) of experiential choice in dynamic tasks, making them more challenging than strategically optimal adversaries for human defenders. Our research offers three main contributions. First, in a simulation experiment, we demonstrate how IBL attacker agents can learn from experience and become as efficient as optimal strategic algorithms against a strategic defender. In a second simulation experiment, the IBL attackers are pitted against an IBL defender, showing that the IBL attacker can be a more challenging adversary for the IBL defender, while the IBL defender can learn to counter carefully crafted optimal attack strategies. To test these observations, we conducted a third experiment, where humans played the role of defenders against both strategic and IBL attackers in an interactive task. The results confirm the predictions of the second simulation experiment: Cognitive attackers are more challenging for human defenders than strategic attackers. These insights contribute to informing future adversary emulation efforts and training of cyber defenders.<\/jats:p>","DOI":"10.1145\/3712672","type":"journal-article","created":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T11:53:02Z","timestamp":1737978782000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Cyber-War Between Bots: Cognitive Attackers are More Challenging for Defenders than Strategic Attackers"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0042-3401","authenticated-orcid":false,"given":"Yinuo","family":"Du","sequence":"first","affiliation":[{"name":"Software and Social Systems Department, Carnegie Mellon University, Pittsburgh, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8642-5290","authenticated-orcid":false,"given":"Baptiste","family":"Prebot","sequence":"additional","affiliation":[{"name":"Department of Social and Decision Sciences, Carnegie Mellon University, Pittsburgh, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2512-984X","authenticated-orcid":false,"given":"Tyler","family":"Malloy","sequence":"additional","affiliation":[{"name":"Department of Social and Decision Sciences, Carnegie Mellon University, Pittsburgh, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6244-2918","authenticated-orcid":false,"given":"Cleotilde","family":"Gonzalez","sequence":"additional","affiliation":[{"name":"Department of Social and Decision Sciences, Carnegie Mellon University, Pittsburgh, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,3,12]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"2015","volume-title":"47th Hawaii International Conference on System Sciences","author":"Abercrombie Robert K.","year":"2014","unstructured":"Robert K. Abercrombie, Bob G. Schlicher, and Frederick T. Sheldon. 2014. Security analysis of selected AMI failure scenarios using agent based game theoretic simulation. In 47th Hawaii International Conference on System Sciences. IEEE, 2015\u20132024."},{"key":"e_1_3_2_3_2","volume-title":"The International FLAIRS Conference Proceedings","volume":"35","author":"Alford Ron","year":"2022","unstructured":"Ron Alford, Lukas Chrpa, Mauro Vallati, and Andy Applebaum. 2022. Knowledge reformulation and deception as a defense against automated cyber adversaries. In The International FLAIRS Conference Proceedings, Vol. 35. The Florida AI Research Society. https:\/\/journals.flvc.org\/FLAIRS\/article\/view\/130675"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2891891"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315805696"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991111"},{"key":"e_1_3_2_7_2","volume-title":"Conference for Industry and Education Collaboration (CIEC\u201919)","author":"Awojana Tolulope","year":"2019","unstructured":"Tolulope Awojana and Te-Shun Chou. 2019. Overview of learning cybersecurity through game based systems. In Conference for Industry and Education Collaboration (CIEC\u201919)."},{"key":"e_1_3_2_8_2","article-title":"Cyborg: An autonomous cyber operations research gym","author":"Baillie Callum","year":"2020","unstructured":"Callum Baillie, Maxwell Standen, Jonathon Schwartz, Michael Docking, David Bowman, and Junae Kim. 2020. Cyborg: An autonomous cyber operations research gym. arXiv:2002.10667 (2020).","journal-title":"arXiv:2002.10667"},{"key":"e_1_3_2_9_2","article-title":"OpenAI Gym","volume":"1606","author":"Brockman Greg","year":"2016","unstructured":"Greg Brockman, Vicki Cheung, Ludwig Pettersson, Jonas Schneider, John Schulman, Jie Tang, and Wojciech Zaremba. 2016. OpenAI Gym. ArXiv abs\/1606.01540 (2016).","journal-title":"ArXiv"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","first-page":"100167","DOI":"10.1016\/j.chbr.2022.100167","article-title":"Hacker types, motivations and strategies: A comprehensive framework","volume":"5","author":"Chng Samuel","year":"2022","unstructured":"Samuel Chng, Han Yu Lu, Ayush Kumar, and David Yau. 2022. Hacker types, motivations and strategies: A comprehensive framework. Comput. Hum. Behav. Rep. 5 (2022), 100167.","journal-title":"Comput. Hum. Behav. Rep."},{"issue":"1","key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1177\/1548512918795061","article-title":"The game-theoretic model and experimental investigation of cyber wargaming","volume":"17","author":"Colbert Edward J. M.","year":"2020","unstructured":"Edward J. M. Colbert, Alexander Kott, and Lawrence P. Knachel. 2020. The game-theoretic model and experimental investigation of cyber wargaming. J. Defense Model. Simul. 17, 1 (2020), 21\u201338.","journal-title":"J. Defense Model. Simul."},{"issue":"3","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"992","DOI":"10.1111\/tops.12513","article-title":"Toward personalized deceptive signaling for cyber defense using cognitive models","volume":"12","author":"Cranford Edward A.","year":"2020","unstructured":"Edward A. Cranford, Cleotilde Gonzalez, Palvi Aggarwal, Sarah Cooney, Milind Tambe, and Christian Lebiere. 2020. Toward personalized deceptive signaling for cyber defense using cognitive models. Topics Cogn. Sci. 12, 3 (2020), 992\u20131011.","journal-title":"Topics Cogn. Sci."},{"key":"e_1_3_2_13_2","article-title":"Towards autonomous cyber defense: Predictions from a cognitive model","author":"Du Yinuo","year":"2022","unstructured":"Yinuo Du, Baptiste Pr\u00e9bot, Xiaoli Xi, and Cleotilde Gonzalez. 2022. Towards autonomous cyber defense: Predictions from a cognitive model. In Human Factors and Ergonomics Society Annual Meeting.","journal-title":"Human Factors and Ergonomics Society Annual Meeting"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/978-3-642-22348-8_24","volume-title":"Data and Applications Security and Privacy XXV","author":"Dutt Varun","year":"2011","unstructured":"Varun Dutt, Young-Suk Ahn, and Cleotilde Gonzalez. 2011. Cyber situation awareness: Modeling the security analyst in a cyber-attack scenario through instance-based learning. In Data and Applications Security and Privacy XXV, Yingjiu Li (Ed.). Springer Berlin, 280\u2013292."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Kimberly Ferguson-Walter Robert Gutzwiller Dakota Scott and Craig Johnson. 2021. Oppositional human factors in cybersecurity: A preliminary analysis of affective states. DOI:10.1109\/ASEW52652.2021.00040","DOI":"10.1109\/ASEW52652.2021.00040"},{"key":"e_1_3_2_16_2","volume-title":"The Tularosa Study: An Experimental Design and Implementation to Quantify the Effectiveness of Cyber Deception.","author":"Ferguson-Walter Kimberly","year":"2018","unstructured":"Kimberly Ferguson-Walter, Temmie Shade, Andrew Rogers, Michael Christopher Stefan Trumbo, Kevin S. Nauer, Kristin Marie Divis, Aaron Jones, Angela Combs, and Robert G. Abbott. 2018. The Tularosa Study: An Experimental Design and Implementation to Quantify the Effectiveness of Cyber Deception.Technical Report. Sandia National Lab, Albuquerque, NM (United States)."},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Cleotilde Gonzalez. 2024. Building human-like artificial agents: A general cognitive algorithm for emulating human decision-making in dynamic environments. Perspectives on Psychological Science 19 5 (2024) 860\u2013873.","DOI":"10.1177\/17456916231196766"},{"key":"e_1_3_2_18_2","first-page":"1825","volume-title":"53rd Hawaii International Conference on System Sciences","author":"Gonzalez Cleotilde","year":"2020","unstructured":"Cleotilde Gonzalez, Palvi Aggarwal, Christian Lebiere, and Edward Cranford. 2020. Design of dynamic and personalized deception: A research framework and new insights. In 53rd Hawaii International Conference on System Sciences. 1825\u20131834."},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11391-3_6"},{"issue":"4","key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1037\/a0024558","article-title":"Instance-based learning: Integrating sampling and repeated decisions from experience.","volume":"118","author":"Gonzalez Cleotilde","year":"2011","unstructured":"Cleotilde Gonzalez and Varun Dutt. 2011. Instance-based learning: Integrating sampling and repeated decisions from experience. Psychol. Rev. 118, 4 (2011), 523.","journal-title":"Psychol. Rev."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2704_2"},{"key":"e_1_3_2_22_2","first-page":"81","volume-title":"14th International Conference on Advanced Communication Technology (ICACT\u201912)","author":"Hald Sara L. N.","year":"2012","unstructured":"Sara L. N. Hald and Jens M. Pedersen. 2012. An updated taxonomy for characterizing hackers according to their threat properties. In 14th International Conference on Advanced Communication Technology (ICACT\u201912). IEEE, 81\u201386."},{"key":"e_1_3_2_23_2","first-page":"461","volume-title":"IFIP International Information Security Conference","author":"Hamilton Samuel N.","year":"2008","unstructured":"Samuel N. Hamilton and Wendy L. Hamilton. 2008. Adversary modeling and simulation in cyber warfare. In IFIP International Information Security Conference. Springer, 461\u2013475."},{"key":"e_1_3_2_24_2","first-page":"364","volume-title":"International Conference on Automated Planning and Scheduling","author":"Hoffmann J\u00f6rg","year":"2015","unstructured":"J\u00f6rg Hoffmann. 2015. Simulated penetration testing: From \u201cDijkstra\u201d to \u201cTuring test++.\u201d In International Conference on Automated Planning and Scheduling. 364\u2013372."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/make4010009"},{"issue":"3","key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1109\/MSP.2005.64","article-title":"CyberCIEGE: Gaming for information assurance","volume":"3","author":"Irvine Cynthia E.","year":"2005","unstructured":"Cynthia E. Irvine, Michael F. Thompson, and Ken Allen. 2005. CyberCIEGE: Gaming for information assurance. IEEE Secur. Privac. 3, 3 (2005), 61\u201364.","journal-title":"IEEE Secur. Privac."},{"key":"e_1_3_2_27_2","first-page":"140","volume-title":"36th IEEE\/ACM International Conference on Automated Software Engineering Workshops (ASEW\u201921)","author":"Johnson Chelsea K.","year":"2021","unstructured":"Chelsea K. Johnson, Robert S. Gutzwiller, Joseph Gervais, and Kimberly J. Ferguson-Walter. 2021. Decision-making biases and cyber attackers. In 36th IEEE\/ACM International Conference on Automated Software Engineering Workshops (ASEW\u201921). IEEE, 140\u2013144."},{"issue":"3","key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3152893","article-title":"The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals","volume":"18","author":"Jones Keith S.","year":"2018","unstructured":"Keith S. Jones, Akbar Siami Namin, and Miriam E. Armstrong. 2018. The core cyber-defense knowledge, skills, and abilities that cybersecurity students should learn in school: Results from interviews with cybersecurity professionals. ACM Trans. Comput. Educ. 18, 3 (2018), 1\u201312.","journal-title":"ACM Trans. Comput. Educ."},{"issue":"1","key":"e_1_3_2_29_2","doi-asserted-by":"crossref","first-page":"tyab005","DOI":"10.1093\/cybsec\/tyab005","article-title":"Simulation for cybersecurity: State of the art and future directions","volume":"7","author":"Kavak Hamdi","year":"2021","unstructured":"Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, and Sachin Shetty. 2021. Simulation for cybersecurity: State of the art and future directions. J. Cybersecur. 7, 1 (2021), tyab005.","journal-title":"J. Cybersecur."},{"key":"e_1_3_2_30_2","first-page":"2054","volume-title":"Winter Simulations Conference (WSC\u201913)","author":"Kiesling Elmar","year":"2013","unstructured":"Elmar Kiesling, Christine Strauss, Andreas Ekelhart, Bernhard Grill, and Christian Stummer. 2013. Simulation-based optimization of information security controls: An adversary-centric approach. In Winter Simulations Conference (WSC\u201913). IEEE, 2054\u20132065."},{"key":"e_1_3_2_31_2","first-page":"614","volume-title":"4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications","author":"Kotenko Igor","year":"2007","unstructured":"Igor Kotenko. 2007. Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security. In 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IEEE, 614\u2013619."},{"key":"e_1_3_2_32_2","first-page":"12268","volume-title":"AAAI Conference on Artificial Intelligence","author":"Langley Pat","year":"2022","unstructured":"Pat Langley. 2022. The computational gauntlet of human-like learning. In AAAI Conference on Artificial Intelligence. 12268\u201312273."},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Clemens M. Lechner Daniel Danner Fabian Fl\u00f6ck Lisa Posch Arnim Bleier and Markus Strohmaier.2019. Measuring motivations of crowdworkers: The multidimensional crowdworker motivation scale. ACM Transactions on Social Computing 2 2 (2019) 1\u201334.","DOI":"10.1145\/3335081"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.03.037"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.145"},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Konstantinos Mitsopoulos Sterling Somers Joel Schooler Christian Lebiere Peter Pirolli and Robert Thomson. 2021. Toward a psychology of deep reinforcement learning agents using a cognitive architecture. Topics in Cognitive Science 14 4 (2021) 756\u201379.","DOI":"10.1111\/tops.12573"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"982","DOI":"10.3389\/fpsyg.2017.00982","article-title":"Security under uncertainty: Adaptive attackers are more challenging to human defenders than random attackers","volume":"8","author":"Moisan Fr\u00e9d\u00e9ric","year":"2017","unstructured":"Fr\u00e9d\u00e9ric Moisan and Cleotilde Gonzalez. 2017. Security under uncertainty: Adaptive attackers are more challenging to human defenders than random attackers. Front. Psychol. 8 (2017), 982.","journal-title":"Front. Psychol."},{"key":"e_1_3_2_38_2","first-page":"256","volume-title":"IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER\u201912)","author":"Nagarajan Ajay","year":"2012","unstructured":"Ajay Nagarajan, Jan M. Allbeck, Arun Sood, and Terry L. Janssen. 2012. Exploring game design for cybersecurity training. In IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER\u201912). IEEE, 256\u2013262."},{"key":"e_1_3_2_39_2","volume-title":"Credit Assignment: Challenges and Opportunities in Developing Human-like AI Agents","author":"Nguyen Thuy Ngoc","year":"2021","unstructured":"Thuy Ngoc Nguyen, Chase McDonald, and Cleotilde Gonzalez. 2021. Credit Assignment: Challenges and Opportunities in Developing Human-like AI Agents. Technical Report. Carnegie Mellon University."},{"issue":"5","key":"e_1_3_2_40_2","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1177\/0018720820960865","article-title":"Human\u2013autonomy teaming: A review and analysis of the empirical literature","volume":"64","author":"O\u2019Neill Thomas","year":"2022","unstructured":"Thomas O\u2019Neill, Nathan McNeese, Amy Barron, and Beau Schelble. 2022. Human\u2013autonomy teaming: A review and analysis of the empirical literature. Hum. Factors 64, 5 (2022), 904\u2013938.","journal-title":"Hum. Factors"},{"key":"e_1_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Baptiste Prebot Yinuo Du and Cleotilde Gonzalez. 2023. Learning about simulated adversaries from human defenders using interactive cyber-defense games. arxiv:2304.01142 [cs.CR]","DOI":"10.1093\/cybsec\/tyad022"},{"key":"e_1_3_2_42_2","volume-title":"2nd International Conference on Autonomous Intelligent Cyber-defence Agents (AICA\u201922)","author":"Pr\u00e9bot Baptiste","year":"2022","unstructured":"Baptiste Pr\u00e9bot, Yinuo Du, Xiaoli Xi, and Cleotilde Gonzalez. 2022. Cognitive models of dynamic decision in autonomous intelligent cyber defense. In 2nd International Conference on Autonomous Intelligent Cyber-defence Agents (AICA\u201922)."},{"key":"e_1_3_2_43_2","doi-asserted-by":"crossref","first-page":"135","DOI":"10.3389\/fpsyg.2018.00135","article-title":"Creative persuasion: A study on adversarial behaviors and strategies in phishing attacks","volume":"9","author":"Rajivan Prashanth","year":"2018","unstructured":"Prashanth Rajivan and Cleotilde Gonzalez. 2018. Creative persuasion: A study on adversarial behaviors and strategies in phishing attacks. Front. Psychol. 9 (2018), 135.","journal-title":"Front. Psychol."},{"key":"e_1_3_2_44_2","volume-title":"OPNETWORKS Conference","author":"Razak Shabana","year":"2002","unstructured":"Shabana Razak, Mian Zhou, and Sheau-Dong Lang. 2002. Network intrusion simulation using OPNET. In OPNETWORKS Conference. Citeseer."},{"issue":"3","key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.beproc.2012.03.017","article-title":"Discounting the freedom to choose: Implications for the paradox of choice","volume":"90","author":"Reed Derek D.","year":"2012","unstructured":"Derek D. Reed, Brent A. Kaplan, and Adam T. Brewer. 2012. Discounting the freedom to choose: Implications for the paradox of choice. Behav. Process. 90, 3 (2012), 424\u2013427.","journal-title":"Behav. Process."},{"key":"e_1_3_2_46_2","first-page":"44","article-title":"Cybersecurity exercises: Wargaming and red teaming","volume":"54","author":"Russo Lorenzo","year":"2019","unstructured":"Lorenzo Russo, Francesco Binaschi, Alessio De Angelis, A. Armando, M. Henauer, and A. Rigoni. 2019. Cybersecurity exercises: Wargaming and red teaming. Next Gen. CERTs 54 (2019), 44.","journal-title":"Next Gen. CERTs"},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1002\/9780470939338.ch6","article-title":"Doing better but feeling worse: The paradox of choice","author":"Schwartz Barry","year":"2004","unstructured":"Barry Schwartz and Andrew Ward. 2004. Doing better but feeling worse: The paradox of choice. Positive Psychology in Practice (2004), 86\u2013104.","journal-title":"Positive Psychology in Practice"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.018"},{"key":"e_1_3_2_49_2","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1109\/SECPRI.2002.1004377","volume-title":"IEEE Symposium on Security and Privacy (SP\u201902)","author":"Sheyner Oleg","year":"2002","unstructured":"Oleg Sheyner, Joshua Haines, Somesh Jha, Richard Lippmann, and Jeannette M. Wing. 2002. Automated generation and analysis of attack graphs. In IEEE Symposium on Security and Privacy (SP\u201902). IEEE, 273\u2013284."},{"key":"e_1_3_2_50_2","volume-title":"IJCAI-21 1st International Workshop on Adaptive Cyber Defense.","author":"Standen Maxwell","year":"2021","unstructured":"Maxwell Standen, Martin Lucas, David Bowman, Toby J. Richer, Junae Kim, and Damian Marriott. 2021. CAGE challenge 1. In IJCAI-21 1st International Workshop on Adaptive Cyber Defense."},{"key":"e_1_3_2_51_2","unstructured":"Maxwell Standen Martin Lucas David Bowman Toby J. Richer Junae Kim and Damian Marriott. 2021. CybORG: A gym for the development of autonomous cyber agents. arxiv:2108.09118v1"},{"key":"e_1_3_2_52_2","first-page":"1","volume-title":"International Conference on Military Communications and Information Systems (ICMCIS\u201918)","author":"Theron Paul","year":"2018","unstructured":"Paul Theron, Alexander Kott, Martin Dra\u0161ar, Krzysztof Rzadca, Beno\u00eet LeBlanc, Mauno Pihelgas, Luigi Mancini, and Agostino Panico. 2018. Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. In International Conference on Military Communications and Information Systems (ICMCIS\u201918). IEEE, 1\u20139."},{"key":"e_1_3_2_53_2","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.3389\/fpsyg.2020.01049","article-title":"Cognitive models in cybersecurity: Learning from expert analysts and predicting attacker behavior","volume":"11","author":"Veksler Vladislav D.","year":"2020","unstructured":"Vladislav D. Veksler, Norbou Buchler, Claire G. LaFleur, Michael S. Yu, Christian Lebiere, and Cleotilde Gonzalez. 2020. Cognitive models in cybersecurity: Learning from expert analysts and predicting attacker behavior. Front. Psychol. 11 (2020), 1049.","journal-title":"Front. Psychol."},{"issue":"4","key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/S1389-0417(00)00014-0","article-title":"Simple games as dynamic, coupled systems: Randomness and other emergent properties","volume":"1","author":"West Robert L.","year":"2001","unstructured":"Robert L. West and Christian Lebiere. 2001. Simple games as dynamic, coupled systems: Randomness and other emergent properties. Cogn. Syst. Res. 1, 4 (2001), 221\u2013239.","journal-title":"Cogn. Syst. Res."},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10062140"},{"key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.ress.2017.08.002","article-title":"The role of risk preferences in a multi-target defender-attacker resource allocation game","volume":"169","author":"Zhang Jing","year":"2018","unstructured":"Jing Zhang, Jun Zhuang, and Victor Richmond R. Jose. 2018. The role of risk preferences in a multi-target defender-attacker resource allocation game. Reliab. Eng. Syst. Safety 169 (2018), 95\u2013104.","journal-title":"Reliab. Eng. Syst. Safety"}],"container-title":["ACM Transactions on Social Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3712672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3712672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:38Z","timestamp":1750295918000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3712672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,12]]},"references-count":55,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,12,31]]}},"alternative-id":["10.1145\/3712672"],"URL":"https:\/\/doi.org\/10.1145\/3712672","relation":{},"ISSN":["2469-7818","2469-7826"],"issn-type":[{"value":"2469-7818","type":"print"},{"value":"2469-7826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,12]]},"assertion":[{"value":"2023-01-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}