<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Mitigating Human Errors and Cognitive Bias for Human-AI Synergy in Cybersecurity</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Federico</forename><forename type="middle">Maria</forename><surname>Cau</surname></persName>
							<email>federicom.cau@unica.it</email>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Mathematics and Computer Science</orgName>
								<orgName type="institution">University of Cagliari</orgName>
								<address>
									<addrLine>Via Ospedale 72</addrLine>
									<postCode>09124</postCode>
									<settlement>Cagliari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lucio</forename><forename type="middle">Davide</forename><surname>Spano</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Dept. of Mathematics and Computer Science</orgName>
								<orgName type="institution">University of Cagliari</orgName>
								<address>
									<addrLine>Via Ospedale 72</addrLine>
									<postCode>09124</postCode>
									<settlement>Cagliari</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Mitigating Human Errors and Cognitive Bias for Human-AI Synergy in Cybersecurity</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">6BAAB9D89A4AF5B7455D30CC89EE50CF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cybersecurity</term>
					<term>Artificial Intelligence</term>
					<term>Intelligent User Interfaces</term>
					<term>Cognitive biases (L. D. Spano) 0000-0002-8261-3200 (F. M. Cau); 0000-0001-7106-0463 (L. D. Spano)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Cybersecurity advancements necessitate effective measures to combat rising and sophisticated threats. Artificial Intelligence (AI) and eXplainable AI (XAI) solutions have demonstrated significant capabilities in predicting and responding to cyber threats. Moreover, integrating AI components with Intelligent User Interfaces (IUI) has been explored as a promising approach, emphasizing user experience and interaction policies. Despite these advancements, the primary challenge remains addressing human errors, particularly those induced by cognitive biases. This paper provides an overview of possible recommendations on AI integration with cybersecurity systems and human cognitive bias mitigation solutions.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>With the advance of technology in different sectors, cybersecurity becomes crucial to protect against attacks and ensure digital safety <ref type="bibr" target="#b0">[1]</ref>. As the complexity and frequency of cyber attacks rise, there is a need to employ different measures for identifying and countering emerging threats. Artificial Intelligence (AI) cybersecurity solutions <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref> have proven to be a good ally in fighting cybercrime, which, alongside eXplainable AI (XAI) techniques, have immense power in reducing and predicting cyber threats <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref>. Recent studies discussed the benefits of integrating AI components with an appropriate Intelligent User Interface (IUI), providing principles to apply when developing intelligent threat modelling tools, especially considering users' interaction guidelines and User Experience (UX) <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>. However, one of the main challenges that may invalidate the effectiveness of cybersecurity systems lies in human errors, often caused by users' cognitive biases <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b13">14]</ref>. This calls for defining strategies to detect and mitigate human irrational judgements (e.g., optimism bias) <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>.</p><p>In this paper, we collect a set of shared problems and overcome strategies arising from the converging literature in cybersecurity considering Artificial Intelligence (AI), Intelligent User Interfaces (IUI), and human cognitive biases in decision-making. We start by outlining the emerging challenges of AI applications in cybersecurity systems and the necessity for explainability resolutions. Next, we list the most encountered cognitive biases and phenomena that undermine users' decision-making and lead to potential errors, accompanied by mitigation approaches.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Work</head><p>In this section, we briefly summarize the emerging gaps and needs in the literature encompassing the fields of Artificial Intelligence (AI), Intelligent User Interface (IUI), and human cognitive bias in the cybersecurity domain.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Artificial Intelligence in Cybersecurity</head><p>Cybersecurity is continuously changing with the development of new technologies and the emergence of new threats <ref type="bibr" target="#b0">[1]</ref>. The integration of Artificial Intelligence (AI) has the potential to significantly enhance cybersecurity systems by enabling them to identify and counter novel and unknown threats <ref type="bibr" target="#b15">[16,</ref><ref type="bibr" target="#b16">17]</ref>. Common approaches encompass AI tactics for identifying and surveilling malicious activities, detecting cyber threats, and safeguarding an organization's networks, which may include Expert Systems, Intelligent Agents, Deep Learning, and Reinforcement Learning <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b18">19]</ref>. Some practical examples of these techniques involve AI systems for Intrusion Detection <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b19">20]</ref>, Botnet Attack Detection <ref type="bibr" target="#b20">[21,</ref><ref type="bibr" target="#b21">22,</ref><ref type="bibr" target="#b22">23,</ref><ref type="bibr" target="#b23">24]</ref>, Malware detection, analysis, and mitigation <ref type="bibr" target="#b24">[25]</ref>. However, integrating complex and black-box AI systems undermines the transparency of these systems' decision-making processes. Adopting eXplainable AI (XAI) techniques becomes a starting point for providing insights into the rationale behind AI-driven decisions and enhancing overall transparency in the cybersecurity domain <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b25">26]</ref>. In addition to adopting Explainable AI (XAI) techniques, assessing AI confidence and robustness becomes crucial to avoid unintended behaviours of AI-based cybersecurity systems. Specifically, estimating measures like uncertainty and implausibility <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28]</ref> allows practitioners to make more informed decisions and adapt cybersecurity measures in responding to new threats.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Intelligent User Interfaces in Cybersecurity</head><p>Integrating Artificial Intelligence (AI) solutions in the cybersecurity ecosystem profoundly influences user interface (UI) design due to its ability to enhance user experiences and enable personalized interactions. This process is commonly referred to as Intelligent User Interface (IUI) design, ultimately leading to user interfaces that are user-centric, engaging, and effective in meeting user needs and expectations <ref type="bibr" target="#b7">[8]</ref>. Previous literature already proposed potential designs of intelligent user interfaces for defending against Malicious Bot Attacks <ref type="bibr" target="#b23">[24]</ref> and preventing Phishing Attacks <ref type="bibr" target="#b28">[29,</ref><ref type="bibr" target="#b29">30]</ref>. Instead, other research explored how users make decisions when engaging with these interfaces during phishing attacks <ref type="bibr" target="#b11">[12]</ref>, showing that the interface design was understandable and familiar to users. However, they posit a need for future research to determine the most effective malicious features to display and how to enhance users' interest and trust. Additionally, further research studied how cognitive bias affects users' decisions in a phishing detection scenario <ref type="bibr" target="#b10">[11]</ref>, revealing that the higher occurrence of hyperbolic discounting bias (i.e., choose immediate rewards over rewards that come later in the future) made it more easily identifiable by humans, reducing its effectiveness in deceiving participants. Conversely, the lower occurrence of authority bias (i.e., the tendency to be more influenced by the opinions and judgments of authority figures) proved more effective in phishing human participants. We will deepen the topic of cognitive biases in the next section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Human Behavioral Decision-Making in Cybersecurity</head><p>A major challenge in the cybersecurity domain concerns the detection and mitigation of human cognitive biases, as they can influence decision-making, leading users to think irrationally in certain situations and make unreasonable judgments <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b30">31]</ref>. Recent research gathered which are the most common cognitive biases based on different scenarios: for example, Gutzwiller et al. <ref type="bibr" target="#b31">[32]</ref> found phenomena like confirmation bias, anchoring bias, and take-the-best heuristic are the most common among red teamers attackers. Furthermore, the authors of <ref type="bibr" target="#b32">[33]</ref> investigated the role of four cognitive biases (i.e., selective perception, exposure to limited alternatives, adjustment and anchoring, and illusion of control) in anticipating and responding to Distributed-Denial-of-Service (DDoS) attacks. They highlighted several practical implications for managers in dealing with the increasing threat of cyberattacks like raising awareness, developing clear step-by-step tested and documented defense procedures, and identifying organizational vulnerabilities. Majumdar et al. <ref type="bibr" target="#b33">[34]</ref> carried out a systematic literature review collecting human-related components (e.g., confirmation bias, availability bias, and framing effect) and risky habits (e.g., sharing passwords, accidental insider threats, and lack of perseverance) that impact cybersecurity practices, also suggesting solutions to overcome them among which: security awareness training, phishing simulations, and incident response plan. Alnifie and Kim <ref type="bibr" target="#b14">[15]</ref> studied another relevant bias called optimism bias, which can result in an inaccurate perception of risks, leading to subjective decisions that lack objectivity. To reduce this bias, they suggest that employees regularly follow instructions from security teams, adhere to cybersecurity policies, and recognize optimism bias at both individual and organizational levels.</p><p>A novel security paradigm that emerged from recent literature <ref type="bibr" target="#b13">[14]</ref> is referred to as cognitive security, where the authors emphasize the vulnerabilities in human cognitive processes (e.g., perception, attention, memory, and mental operations) that can be exploited by cognitive attacks, affecting performance and decision-making. The authors present several cognitive and technical defense methods to deter the kill chain (i.e., the stages of a cyberattack) of cognitive attacks, such as real-time tracking of cognitive attacks, identification of abnormal patterns in human behaviors, introducing compensation mechanisms to mitigate the impact of cognitive attacks, or reducing cognitive load during security incidents.</p><p>Another significant trend investigating human vulnerabilities involves cybersecurity games <ref type="bibr" target="#b34">[35,</ref><ref type="bibr" target="#b35">36]</ref>, where participants make strategic decisions in a simulated environment and tackle real-world cyber threats to enhance their practical understanding of cybersecurity. Jalali et al. <ref type="bibr" target="#b36">[37]</ref> developed a simulation game to assess decision-makers effectiveness in addressing two challenges in cybersecurity capability development: potential delays and uncertainties in predicting cyber incidents. They found that (i) decision-makers respond poorly to time delays in dynamic settings under uncertainty, and (ii) experienced managers did not perform better than inexperienced individuals in making proactive decisions about building cybersecurity capabilities. These results call for a strong need for training tools to underscore the drawbacks of a solely cognition-focused strategy and to grasp the impacts of feedback delays.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Discussion</head><p>The review of the literature work we discussed in Section 2 shows that the integration of AI is increasingly applied to defense mechanisms against cyber threats. From an interaction point of view, solutions that team together humans and AI-based agents are particularly relevant, especially for the tasks where AI-based solutions perform better than humans <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b16">17]</ref>. This suggests that the synergistic teaming of humans and AI is a promising way to address cyber threats' dynamic and complex nature. However, the effectiveness of AI solutions in cybersecurity still poses several key challenges. One prominent issue is the shortage of skilled cybersecurity professionals <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b16">17]</ref>. This scarcity is a barrier even to the spread of AI-based solutions, which require professionals at least to set them up. The lack of professionals also sets a challenge to create and promote adequate educational programmes <ref type="bibr" target="#b2">[3]</ref>, which require expert human trainers again. However, building such programs is crucial for widespread awareness about cyber threats and fostering a culture of cybersecurity consciousness among organizations and individuals.</p><p>Another critical consideration is the design of computing platforms resilient to AI-based adversarial threats <ref type="bibr" target="#b18">[19]</ref>. Rather than treating security measures as an afterthought, there is a growing recognition of embedding resilience into computing infrastructure from the outset. This proactive approach reflects a shared responsibility among stakeholders to mitigate cybersecurity risks effectively.</p><p>Transparency and interpretability are fundamental principles in deploying AI-driven cybersecurity solutions <ref type="bibr" target="#b15">[16]</ref>. Biased data and decision-making processes pose significant challenges, as the opaque nature of AI models complicates understanding their logic and outcomes. It is often difficult for an administrator to understand the AI system logic in the event of a security breach. AI systems sometimes provide inaccurate findings in the form of false positives, which mislead security experts, jeopardizing the entire system's integrity <ref type="bibr" target="#b16">[17]</ref>. Assimilating eXplainable AI solutions <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7]</ref> along with factors such as AI robustness and uncertainty <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28]</ref> is essential for maintaining trust and confidence in cybersecurity systems. Additionally, it is worth mentioning that XAI techniques can face security attacks, which emphasizes the need to carry out experimental studies of the impacts of various attacks on XAI methodologies, together with a balance between the security and usability of XAI-integrated cybersecurity systems <ref type="bibr" target="#b25">[26]</ref>.</p><p>Moreover, cognitive biases inherent in human decision-making introduce additional complexities to cybersecurity strategies <ref type="bibr" target="#b31">[32]</ref>. The presence of biases, such as the take-the-best heuristic, confirmation bias, optimism bias, and anchoring bias <ref type="bibr" target="#b33">[34]</ref>, along with other phenomena like framing effects, sunk cost, irrational escalation, and the illusion of control <ref type="bibr" target="#b32">[33]</ref>, poses challenges for measurement. Future research should focus on inducing and assessing the exhibition of biased behaviour, moving away from over-reliance on observational assessment. Additionally, researchers should develop experimental designs and measures specifically designed to elicit particular biases.</p><p>In particular, optimism bias <ref type="bibr" target="#b14">[15]</ref> refers to the tendency of individuals, regardless of their capacity, to perceive risks inappropriately. They often believe they are not vulnerable or exhibit overconfidence in the effectiveness of security measures: essentially, they think, "I/we won't be a target." To address this bias, researchers can explore longitudinal studies that track the development and evolution of optimism bias over time. Additionally, evaluating the effectiveness of different interventions, such as training programs, awareness campaigns, and educational initiatives, can help mitigate this bias. Furthermore, considering AI approaches may provide valuable insights into managing optimism bias.</p><p>Unique conditions significantly impact which biases are possible to study. For instance, it would be tough to investigate illusory correlation in a context lacking relevant data for correlation. Similarly, studying sunk cost <ref type="bibr" target="#b31">[32]</ref> would be challenging if no resources were utilized. Some biases remain understudied, including the availability heuristic, default effect, and informationpooling bias. Additionally, social engineering techniques exploit cognitive biases to manipulate user behaviour <ref type="bibr" target="#b13">[14]</ref>, highlighting the importance of user training and awareness programs. Cultivating critical thinking skills and promoting a culture of cybersecurity consciousness is essential for defending against cognitive attacks and enhancing overall cybersecurity resilience.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion and Future Work</head><p>This paper summarised the shared needs and shortcomings of Artificial Intelligence (AI) solutions and human decision-making biases in cybersecurity. We discussed common points that emerge from the literature and provide potential directions against cybersecurity threats, which we outline as follows. The first significant aspect regards the importance of human-AI collaboration, urging the promotion of suitable professional programs to address the shortage of skilled cybersecurity experts. The second point highlights the necessity for transparency and explainability in cybersecurity AI solutions, revealing the necessity of planning new procedures to defend against AI-based cybersecurity attacks. Finally, the last trait calls for training programs to detect and measure cognitive biases, along with experimental settings that stimulate these biases, intending to elicit users' awareness and foster the growth of the cybersecurity culture.</p><p>Follow-up studies need to consider these aspects for a better AI-based cybersecurity systems administration, ensuring effective cyber-threat detection and mitigation by appropriately addressing human cognitive biases.</p></div>		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work has been supported by the Italian Ministry of University and Research (MUR) and by the European Union -NextGenerationEU, under grant PRIN 2022 PNRR "DAMOCLES: Detection And Mitigation Of Cyber attacks that exploit human vuLnerabilitiES" (Grant P2022FXP5B).</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Cyber security: State of the art, challenges and future directions</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">S</forename><surname>Admass</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">Y</forename><surname>Munaye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Diro</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.csa.2023.100031</idno>
		<ptr target="https://doi.org/10.1016/j.csa.2023.100031" />
	</analytic>
	<monogr>
		<title level="j">Cyber Security and Applications</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page">100031</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A cloud intrusion detection systems based on dnn using backpropagation and pso on the cse-cic-ids2018 dataset</title>
		<author>
			<persName><forename type="first">S</forename><surname>Alzughaibi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">El</forename><surname>Khediri</surname></persName>
		</author>
		<idno type="DOI">10.3390/app13042276</idno>
		<ptr target="https://www.mdpi.com/2076-3417/13/4/2276.doi:10.3390/app13042276" />
	</analytic>
	<monogr>
		<title level="j">Applied Sciences</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">A</forename><surname>Chakraborty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Biswas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Khan</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-031-12419-8_1</idno>
		<title level="m">Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="3" to="25" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Ai in cybersecurity</title>
		<author>
			<persName><forename type="first">M</forename><surname>Corbett</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sajal</surname></persName>
		</author>
		<idno type="DOI">10.1109/IETC57902.2023.10152034</idno>
	</analytic>
	<monogr>
		<title level="m">2023 Intermountain Engineering, Technology and Computing (IETC)</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="334" to="338" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Enhancing cybersecurity: The power of artificial intelligence in threat detection and prevention</title>
		<author>
			<persName><forename type="first">M</forename><surname>Rizvi</surname></persName>
		</author>
		<ptr target="https://journal-repository.theshillonga.com/index.php/ijaers/article/view/6352" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Advanced Engineering Research and Science</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Explainable artificial intelligence for cybersecurity: a literature survey</title>
		<author>
			<persName><forename type="first">F</forename><surname>Charmet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">C</forename><surname>Tanuwidjaja</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ayoubi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P.-F</forename><surname>Gimenez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Jmila</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Blanc</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Takahashi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1007/s12243-022-00926-7</idno>
		<ptr target="https://doi.org/10.1007/s12243-022-00926-7.doi:10.1007/s12243-022-00926-7" />
	</analytic>
	<monogr>
		<title level="j">Annals of Telecommunications</title>
		<imprint>
			<biblScope unit="volume">77</biblScope>
			<biblScope unit="page" from="789" to="812" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A survey on explainable artificial intelligence for cybersecurity</title>
		<author>
			<persName><forename type="first">G</forename><surname>Rjoub</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bentahar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Wahab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Mizouni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Cohen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Otrok</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Mourad</surname></persName>
		</author>
		<idno type="DOI">10.1109/TNSM.2023.3282740</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Network and Service Management</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="5115" to="5140" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">E T</forename><surname>Akinsola</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">I</forename><surname>Akinseinde</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kalesanwo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Adeagbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Oladapo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Awoseyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">A</forename><surname>Kasali</surname></persName>
		</author>
		<ptr target="https://api.semanticscholar.org/CorpusID:233567804" />
		<title level="m">Application of artificial intelligence in user interfaces design for cyber security threat modeling, Intelligent User Interfaces</title>
				<imprint>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
	<note>Working Title</note>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Why people still fall for phishing emails: An empirical investigation into how users make email response decisions</title>
		<author>
			<persName><forename type="first">A</forename><surname>Jayatilaka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A G</forename><surname>Arachchilage</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Babar</surname></persName>
		</author>
		<idno>ArXiv abs/2401.13199</idno>
		<ptr target="https://api.semanticscholar.org/CorpusID:267200262" />
		<imprint>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Presenting suspicious details in User-Facing e-mail headers does not improve phishing detection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Zheng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Becker</surname></persName>
		</author>
		<ptr target="https://www.usenix.org/conference/soups2022/presentation/zheng" />
	</analytic>
	<monogr>
		<title level="m">Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)</title>
				<meeting><address><addrLine>Boston, MA</addrLine></address></meeting>
		<imprint>
			<publisher>USENIX Association</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="253" to="271" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">How the presence of cognitive biases in phishing emails affects human decision-making?</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sharma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gonzalez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Dutt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Neural Information Processing</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Tanveer</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Agarwal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Ozawa</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Ekbal</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Jatowt</surname></persName>
		</editor>
		<meeting><address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="550" to="560" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Explanations in warning dialogs to help users defend against phishing attacks</title>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Aneke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ardito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lanzilotti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">F</forename><surname>Costabile</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.ijhcs.2023.103056</idno>
		<ptr target="https://doi.org/10.1016/j.ijhcs.2023.103056" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">176</biblScope>
			<biblScope unit="page">103056</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Quantifying the effect of cognitive bias on security decision-making for authentication methods</title>
		<author>
			<persName><forename type="first">T</forename><surname>Albalawi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ghazinour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Melton</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Brain Inspired Cognitive Systems</title>
				<editor>
			<persName><forename type="first">J</forename><surname>Ren</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Hussain</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">H</forename><surname>Zhao</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Huang</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Zheng</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><surname>Cai</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Chen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Y</forename><surname>Xiao</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="139" to="154" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhu</surname></persName>
		</author>
		<idno>ArXiv abs/2301.05920</idno>
		<ptr target="https://api.semanticscholar.org/CorpusID:255942622" />
		<title level="m">An introduction of system-scientific approaches to cognitive security</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Appraising the manifestation of optimism bias and its impact on human perception of cyber security: A meta analysis</title>
		<author>
			<persName><forename type="first">K</forename><surname>Alnifie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kim</surname></persName>
		</author>
		<idno type="DOI">10.4236/jis.2023.142007</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Security</title>
		<imprint>
			<biblScope unit="volume">14</biblScope>
			<biblScope unit="page" from="93" to="110" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">A new era of cybersecurity: The influence of artificial intelligence</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Shanthi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">K</forename><surname>Sasi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Gouthaman</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICNWC57852.2023.10127453</idno>
	</analytic>
	<monogr>
		<title level="m">2023 International Conference on Networking and Communications (ICNWC)</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Current trends in ai and ml for cybersecurity: A stateof-the-art survey</title>
		<author>
			<persName><forename type="first">N</forename><surname>Mohamed</surname></persName>
		</author>
		<idno type="DOI">10.1080/23311916.2023.2272358</idno>
		<idno>arXiv:</idno>
		<ptr target="https://doi.org/10.1080/23311916.2023.2272358" />
	</analytic>
	<monogr>
		<title level="j">Cogent Engineering</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">2272358</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Integration of ai with the cybersecurity: A detailed systematic review with the practical issues and challenges</title>
		<author>
			<persName><forename type="first">M</forename><surname>Lourens</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Dabral</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Gangodkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Rathour</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">N</forename><surname>Tida</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Chadha</surname></persName>
		</author>
		<idno type="DOI">10.1109/IC3I56241.2022.10073040</idno>
	</analytic>
	<monogr>
		<title level="m">5th International Conference on Contemporary Computing and Informatics (IC3I)</title>
				<imprint>
			<date type="published" when="2022">2022. 2022</date>
			<biblScope unit="page" from="1290" to="1295" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Artificial intelligence for cybersecurity: Offensive tactics, mitigation techniques and future directions</title>
		<author>
			<persName><forename type="first">E</forename><surname>Adi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Baig</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zeadally</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Applied Cybersecurity &amp; Internet Governance</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="2" to="24" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A comprehensive survey on machine learning-based intrusion detection systems for secure communication in internet of things</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">V N</forename><surname>Santhosh Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Selvi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kannan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">D</forename><surname>Doulamis</surname></persName>
		</author>
		<idno type="DOI">10.1155/2023/8981988</idno>
		<ptr target="https://doi.org/10.1155/2023/8981988.doi:10.1155/2023/8981988" />
	</analytic>
	<monogr>
		<title level="j">Intell. Neuroscience</title>
		<imprint>
			<date type="published" when="2023">2023. 2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Comparing and analyzing applications of intelligent techniques in cyberattack detection</title>
		<author>
			<persName><forename type="first">P</forename><surname>Dixit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Kohli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Acevedo-Duque</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Gonzalez-Diaz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">H</forename><surname>Jhaveri</surname></persName>
		</author>
		<idno type="DOI">10.1155/2021/5561816</idno>
		<ptr target="https://doi.org/10.1155/2021/5561816.doi:10.1155/2021/5561816" />
	</analytic>
	<monogr>
		<title level="j">Security and Communication Networks</title>
		<imprint>
			<biblScope unit="page">5561816</biblScope>
			<date type="published" when="2021">2021. 2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">An intelligent iot attack detection framework using effective edge ai based computing</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">S</forename></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">G</forename></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename></persName>
		</author>
		<idno type="DOI">10.21817/indjcse/2022/v13i4/221304059</idno>
	</analytic>
	<monogr>
		<title level="j">Indian Journal of Computer Science and Engineering</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="page" from="1156" to="1167" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Ensemble machine learning techniques for accurate and efficient detection of botnet attacks in connected computers</title>
		<author>
			<persName><forename type="first">S</forename><surname>Afrifa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Varadarajan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Appiahene</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Domfeh</surname></persName>
		</author>
		<idno type="DOI">10.3390/eng4010039</idno>
		<ptr target="https://www.mdpi.com/2673-4117/4/1/39.doi:10.3390/eng4010039" />
	</analytic>
	<monogr>
		<title level="j">Eng</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="650" to="664" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Ai-powered detection and prevention tool to secure apis from malicious bot attacks</title>
		<author>
			<persName><forename type="first">C</forename><surname>Dinuwan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Amandakoon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Aberathne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Wimalarathna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Ratnayake</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Smart Trends in Computing and Communications</title>
				<editor>
			<persName><forename type="first">T</forename><surname>Senjyu</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>So-In</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Joshi</surname></persName>
		</editor>
		<meeting><address><addrLine>Singapore, Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer Nature</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="555" to="566" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation</title>
		<author>
			<persName><forename type="first">A</forename><surname>Djenna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bouridane</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rubab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">M</forename><surname>Marou</surname></persName>
		</author>
		<idno type="DOI">10.3390/sym15030677</idno>
	</analytic>
	<monogr>
		<title level="j">Symmetry</title>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page">677</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<author>
			<persName><forename type="first">G</forename><surname>Srivastava</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">H</forename><surname>Jhaveri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bhattacharya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pandya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">K R</forename><surname>Rajeswari</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Maddikunta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">G</forename><surname>Yenduri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Hall</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">R</forename><surname>Alazab</surname></persName>
		</author>
		<author>
			<persName><surname>Gadekallu</surname></persName>
		</author>
		<idno type="arXiv">arXiv:2206.03585</idno>
		<title level="m">Xai for cybersecurity: State of the art, challenges, open issues and future directions</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<title level="m" type="main">Evaluation of robustness metrics for defense of machine learning systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Demarchi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Rijken</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Melrose</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Madahar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Fumera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Roli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ledda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Aktaş</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Kurth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Baggenstoss</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Pelzer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Kanestad</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICMCIS59922.2023.10253593</idno>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="12" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Uncertainty-aware prediction validator in deep learning models for cyber-physical system data</title>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">O</forename><surname>Catak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ali</surname></persName>
		</author>
		<idno type="DOI">10.1145/3527451</idno>
		<ptr target="https://doi.org/10.1145/3527451.doi:10.1145/3527451" />
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Softw. Eng. Methodol</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<monogr>
		<title level="m" type="main">Towards intelligent user interfaces to prevent phishing attacks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Aneke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ardito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<idno type="DOI">10.18573/book3.ak</idno>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="279" to="288" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Designing an Intelligent User Interface for Preventing Phishing Attacks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Aneke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Ardito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Desolda</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-030-46540-7_10</idno>
		<ptr target="https://inria.hal.science/hal-03188818.doi:10.1007/978-3-030-46540-7\_10,part3" />
	</analytic>
	<monogr>
		<title level="m">Workshop on Handling Security, Usability, User Experience and Reliability in User-Centered Development Processes</title>
				<editor>
			<persName><forename type="first">J</forename><forename type="middle">A</forename><surname>Nocera</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Parmaxi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Winckler</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">F</forename><surname>Loizides</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Ardito</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">G</forename><surname>Bhutkar</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">P</forename><surname>Dannenmann</surname></persName>
		</editor>
		<meeting><address><addrLine>Paphos, Cyprus</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="97" to="106" />
		</imprint>
	</monogr>
	<note>17th IFIP Conference on Human-Computer Interaction (INTERACT), volume LNCS-11930 of Beyond Interactions</note>
</biblStruct>

<biblStruct xml:id="b30">
	<analytic>
		<title level="a" type="main">The Electronic Hive Mind and Cybersecurity: Mass-Scale Human Cognitive Limits to Explain the &quot;Weakest Link</title>
		<author>
			<persName><forename type="first">S</forename><surname>Hai-Jew</surname></persName>
		</author>
		<idno type="DOI">10.4018/978-1-5225-5927-6.ch011</idno>
	</analytic>
	<monogr>
		<title level="j">Cybersecurity</title>
		<imprint>
			<biblScope unit="page" from="206" to="262" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Are cyber attackers thinking fast and slow? exploratory analysis reveals evidence of decision-making biases in red teamers</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Gutzwiller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Ferguson-Walter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Fugate</surname></persName>
		</author>
		<idno type="DOI">10.1177/1071181319631096</idno>
		<idno>arXiv:</idno>
		<ptr target="https://doi.org/10.1177/1071181319631096" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Human Factors and Ergonomics Society Annual Meeting</title>
				<meeting>the Human Factors and Ergonomics Society Annual Meeting</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">63</biblScope>
			<biblScope unit="page" from="427" to="431" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">The role of cognitive biases in anticipating and responding to cyberattacks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ceric</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Holland</surname></persName>
		</author>
		<idno type="DOI">10.1108/ITP-11-2017-0390</idno>
		<ptr target="https://doi.org/10.1108/ITP-11-2017-0390.doi:10.1108/ITP-11-2017-0390" />
	</analytic>
	<monogr>
		<title level="j">Information Technology &amp; People</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="page" from="171" to="188" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<monogr>
		<title level="m" type="main">Human elements impacting risky habits in cybersecurity</title>
		<author>
			<persName><forename type="first">N</forename><surname>Majumdar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Ramteke</surname></persName>
		</author>
		<idno type="DOI">10.1063/5.0110624</idno>
		<imprint>
			<date type="published" when="2022">2022</date>
			<biblScope unit="volume">2519</biblScope>
			<biblScope unit="page">30006</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b34">
	<monogr>
		<title level="m" type="main">Bascps: How does behavioral decision making impact the security of cyber-physical systems?</title>
		<author>
			<persName><forename type="first">M</forename><surname>Abdallah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Woods</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">N</forename><surname>Ardabili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">M</forename><surname>Khalil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">N</forename><surname>Cason</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Sundaram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Bagchi</surname></persName>
		</author>
		<idno>ArXiv abs/2004.01958</idno>
		<ptr target="https://api.semanticscholar.org/CorpusID:214802678" />
		<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b35">
	<analytic>
		<title level="a" type="main">Learning to defend by attacking (and vice-versa): Transfer of learning in cybersecurity games</title>
		<author>
			<persName><forename type="first">T</forename><surname>Malloy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gonzalez</surname></persName>
		</author>
		<idno type="DOI">10.1109/EuroSPW59978.2023.00056</idno>
		<ptr target="https://doi.ieeecomputersociety.org/10.1109/EuroSPW59978.2023.00056.doi:10.1109/EuroSPW59978.2023.00056" />
	</analytic>
	<monogr>
		<title level="m">IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)</title>
				<meeting><address><addrLine>Los Alamitos, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2023">2023. 2023</date>
			<biblScope unit="page" from="458" to="464" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b36">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Jalali</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Siegel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">E</forename><surname>Madnick</surname></persName>
		</author>
		<ptr target="https://api.semanticscholar.org/CorpusID:7219775" />
		<title level="m">Decision-making and biases in cybersecurity capability development: Evidence from a simulation game experiment</title>
				<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note>Cyberspace Law eJournal</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
