1st International Workshop on Deceptive AI @ECAI2020
-
Updated
Jul 10, 2020 - Python
1st International Workshop on Deceptive AI @ECAI2020
An easy-to-use smartphone app for the response time concealed information test.
A simple, low-interaction HTTP honeypot server in Python for easy network traffic monitoring
A simple, low-interaction HTTPS honeypot server in Python for easy network traffic monitoring
A simple, low-interaction FTP honeypot server in Python for easy network traffic monitoring
Junk credential generator for SQL in CSV format, intended to introduce uncertainty to attacker exfiltrated data.
This is a computational framework to analyze raw biological data generated from a polygraph test for the purpose of making psychophysiological inferences.
Proof-of-concept cyber deception utility emulating Samba and LibSSH
The Kill Chain Evolution of a Middle Eastern Threat Actor Intelligence from Seventeen Months of Deception and Analysis of Politically Targeted Malware Attacks
Social media generation bot. Designed for defensive PSYOPS in cybersecurity.
A simple, low-interaction SIP honeypot server in Python for easy network traffic monitoring
A simple SSH gateway for deception deployments
Presentation slides and code samples of my talks
Version of CyberBattleSim https://github.com/microsoft/CyberBattleSim with extended funcitonality for training RL agents attacks on web applications
Honeypot for file uploads. Written in Go.
A simple, low-interaction SSH honeypot server in Python for easy network traffic monitoring
A simple, low-interaction TELNET honeypot server in Python for easy network traffic monitoring
🕵️ Investigating deceptive business practices and the regulations in place to combat deceptive practices.
Add a description, image, and links to the deception topic page so that developers can more easily learn about it.
To associate your repository with the deception topic, visit your repo's landing page and select "manage topics."