Work Package Deliverable

- WP1: Human and HCI Modelling
  • Summary report pdf
- WP2: Attacks modelling and software development
  • Summary report pdf
- WP3: Manual analysis on human behaviour related attacks
  • Task 3.1 and Task 3.2 (relatd paper is under submission)
  • Task 3.3 (related paper is under submission)
  • Task 3.4 book link
  • Summary report pdf
- WP4: Automated analysis of human behaviour related attacks
  • Task 4.1 technical report pdf
  • Task 4.2 open source software CogTool+ is hosting at CogTool+ (will be public avaiable soon...)
  • Task 4.3 automated analysis of human behaviour enhanced emanation based attacks pdf
  • Task 4.4 user manual and use cases pdf with code example source files
  • Summary report pdf
- WP5
  • Task 5.1 Sumary report pdf
  • Task 5.2 Sumary report pdf
  • Outcomes:
    --Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model pdf
    --Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles pdf

Published Work

  • Ximing Liu, Yingjiu Li, Robert H. Deng, Shujun Li and Bing Chang, "When Human Cognitive Modeling Meets PINs: User-Independent Inter-Keystroke Timing Attacks," accepted to Computers & Security in September 2018, Elsevier pdf
  • Bing Chang, Yingjiu Li, Qiongxiao Wang, Wen-Tao Zhu, and Robert H.Deng, 'Making a good thing better: enhancing password/PIN-based user authentication with smartwatch', In Cybersecurity (2018) 1:7 pdf
  • Haiyue Yuan, Shujun Li, Patrice Rusconi, and Nouf Aljffan, 'When Eye-tracking Meets Cognitive Modeling: Applications to Cyber Security Systems', In HCI International 2017, Vancouver, Canada.(Won best paper award) pdf
  • Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan and Mohamed Ali Kaafar. 'BehavioCog: An Observation Resistant Authentication Scheme', In International Conference of Financial Cryptography and Data Security 2017. pdf
  • N. Williams and S. Li, "Simulating Human Detection of Phishing Websites: An Investigation into the Applicability of the ACT-R Cognitive Behaviour Architecture Model," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, 2017, pp. 1-8. pdf
  • C. Sandy, P. Rusconi and S. Li, "Can Humans Detect the Authenticity of Social Media Accounts? On the Impact of Verbal and Non-Verbal Cues on Credibility Judgements of Twitter Profiles," 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, 2017, pp. 1-8.pdf