no code implementations • 5 Apr 2022 • Linan Huang, Quanyan Zhu
Incentive design is a proactive and non-invasive approach to achieving compliance by aligning an insider's incentive with the defender's security objective, which motivates (rather than commands) an insider to act in the organization's interests.
no code implementations • 1 Nov 2021 • Linan Huang, Quanyan Zhu
In this work, we identify and formally define a new type of proactive attentional attacks called Informational Denial-of-Service (IDoS) attacks that generate a large volume of feint attacks to overload human operators and hide real attacks among feints.
no code implementations • 4 Aug 2021 • Linan Huang, Quanyan Zhu
The numerical results illustrate how AM strategies can alleviate the severity level and the risk of IDoS attacks.
no code implementations • 2 Jul 2021 • Yunhan Huang, Linan Huang, Quanyan Zhu
In this work, we review the literature on RL for cyber resilience and discuss cyber resilience against three major types of vulnerabilities, i. e., posture-related, information-related, and human-related vulnerabilities.
no code implementations • 13 Jun 2021 • Linan Huang, Shumeng Jia, Emily Balcetis, Quanyan Zhu
The results show that the visual aids can statistically increase the attention level and improve the accuracy of phishing recognition from 74. 6% to a minimum of 86%.
no code implementations • 1 Jul 2019 • Linan Huang, Quanyan Zhu
The increasing instances of advanced attacks call for a new defense paradigm that is active, autonomous, and adaptive, named as the \texttt{`3A'} defense paradigm.
Cryptography and Security
no code implementations • 30 Jun 2019 • Linan Huang, Quanyan Zhu
The deception is rational as robots aim to achieve their deception goals at minimum cost.
no code implementations • 27 Jun 2019 • Linan Huang, Quanyan Zhu
In this work, we apply infinite-horizon Semi-Markov Decision Process (SMDP) to characterize a stochastic transition and sojourn time of attackers in the honeynet and quantify the reward-risk trade-off.