Maxine Major

Orcid: 0000-0003-2233-9411

According to our database1, Maxine Major authored at least 12 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Physiological Response to Cyber and Psychological Deception.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Cyber expert feedback: Experiences, expectations, and opinions about cyber deception.
Comput. Secur., 2023

Emotional State Classification and Related Behaviors Among Cyber Attackers.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2021
Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures.
Int. J. Organ. Collect. Intell., 2021

Informing Autonomous Deception Systems with Cyber Expert Performance Data.
CoRR, 2021

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration.
Proceedings of the 5th International Conference on Complexity, 2020

2019
Game theory for adaptive defensive cyber deception.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

The World (of CTF) is Not Enough Data: Lessons Learned from a Cyber Deception Experiment.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Creating Cyber Deception Games.
Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), 2019

2016
Security in the Industrial Internet of Things - The C-SEC Approach.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

2015
An Approach to Organizational Cybersecurity.
Proceedings of the Enterprise Security - Second International Workshop, 2015


  Loading...