{"id":"https://openalex.org/W7114784708","doi":"https://doi.org/10.48550/arxiv.2512.08107","title":"Detecting Ambiguity Aversion in Cyberattack Behavior to Inform Cognitive Defense Strategies","display_name":"Detecting Ambiguity Aversion in Cyberattack Behavior to Inform Cognitive Defense Strategies","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7114784708","doi":"https://doi.org/10.48550/arxiv.2512.08107"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.08107","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.08107","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.08107","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Carney, Stephan","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Carney, Stephan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Hans, Soham","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hans, Soham","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Hirschmann, Sofia","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hirschmann, Sofia","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Marsella, Stacey","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marsella, Stacey","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Fonken, Yvonne","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fonken, Yvonne","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Wu, Peggy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wu, Peggy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Gurney, Nikolos","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gurney, Nikolos","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.12460000067949295,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.12460000067949295,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.0892999991774559,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.07270000129938126,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/operationalization","display_name":"Operationalization","score":0.7893000245094299},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.7638999819755554},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5792999863624573},{"id":"https://openalex.org/keywords/cognition","display_name":"Cognition","score":0.578499972820282},{"id":"https://openalex.org/keywords/action","display_name":"Action (physics)","score":0.48539999127388},{"id":"https://openalex.org/keywords/preference","display_name":"Preference","score":0.43459999561309814},{"id":"https://openalex.org/keywords/ambiguity-aversion","display_name":"Ambiguity aversion","score":0.3564999997615814},{"id":"https://openalex.org/keywords/cognitive-bias","display_name":"Cognitive bias","score":0.3560999929904938}],"concepts":[{"id":"https://openalex.org/C9354725","wikidata":"https://www.wikidata.org/wiki/Q286017","display_name":"Operationalization","level":2,"score":0.7893000245094299},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.7638999819755554},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5792999863624573},{"id":"https://openalex.org/C169900460","wikidata":"https://www.wikidata.org/wiki/Q2200417","display_name":"Cognition","level":2,"score":0.578499972820282},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5544999837875366},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.48539999127388},{"id":"https://openalex.org/C2781249084","wikidata":"https://www.wikidata.org/wiki/Q908656","display_name":"Preference","level":2,"score":0.43459999561309814},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.38600000739097595},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3743000030517578},{"id":"https://openalex.org/C127447990","wikidata":"https://www.wikidata.org/wiki/Q4741446","display_name":"Ambiguity aversion","level":3,"score":0.3564999997615814},{"id":"https://openalex.org/C189216375","wikidata":"https://www.wikidata.org/wiki/Q1127759","display_name":"Cognitive bias","level":3,"score":0.3560999929904938},{"id":"https://openalex.org/C188147891","wikidata":"https://www.wikidata.org/wiki/Q147638","display_name":"Cognitive science","level":1,"score":0.336899995803833},{"id":"https://openalex.org/C180747234","wikidata":"https://www.wikidata.org/wiki/Q23373","display_name":"Cognitive psychology","level":1,"score":0.3343000113964081},{"id":"https://openalex.org/C192327766","wikidata":"https://www.wikidata.org/wiki/Q1038799","display_name":"Cognitive robotics","level":3,"score":0.3336000144481659},{"id":"https://openalex.org/C43521106","wikidata":"https://www.wikidata.org/wiki/Q2165493","display_name":"Pipeline (software)","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.328900009393692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32089999318122864},{"id":"https://openalex.org/C161407221","wikidata":"https://www.wikidata.org/wiki/Q4382939","display_name":"Cognitive model","level":3,"score":0.3149999976158142},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.296099990606308},{"id":"https://openalex.org/C66024118","wikidata":"https://www.wikidata.org/wiki/Q1122506","display_name":"Computational model","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.267300009727478}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.08107","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.08107","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.08107","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.08107","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5039446949958801}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Adversaries":[0],"(hackers)":[1],"attempting":[2],"to":[3,18,62,78],"infiltrate":[4],"networks":[5],"frequently":[6],"face":[7],"uncertainty":[8],"in":[9,85],"their":[10],"operational":[11],"environments.":[12],"This":[13],"research":[14],"explores":[15],"the":[16],"ability":[17],"model":[19,59,77],"and":[20,71],"detect":[21],"when":[22],"they":[23],"exhibit":[24],"ambiguity":[25,82],"aversion,":[26],"a":[27,31,40,56,74,96],"cognitive":[28,91,102],"bias":[29],"reflecting":[30],"preference":[32],"for":[33,99],"known":[34],"(versus":[35],"unknown)":[36],"probabilities.":[37],"We":[38],"introduce":[39],"novel":[41],"methodological":[42],"framework":[43],"that":[44],"(1)":[45],"leverages":[46],"rich,":[47],"multi-modal":[48],"data":[49],"from":[50],"human-subjects":[51],"red-team":[52],"experiments,":[53],"(2)":[54],"employs":[55],"large":[57],"language":[58],"(LLM)":[60],"pipeline":[61],"parse":[63],"unstructured":[64],"logs":[65],"into":[66],"MITRE":[67],"ATT&amp;CK-mapped":[68],"action":[69],"sequences,":[70],"(3)":[72],"applies":[73],"new":[75],"computational":[76],"infer":[79],"an":[80],"attacker's":[81],"aversion":[83],"level":[84],"near-real":[86],"time.":[87],"By":[88],"operationalizing":[89],"this":[90],"trait,":[92],"our":[93],"work":[94],"provides":[95],"foundational":[97],"component":[98],"developing":[100],"adaptive":[101],"defense":[103],"strategies.":[104]},"counts_by_year":[],"updated_date":"2025-12-11T23:13:37.075516","created_date":"2025-12-11T00:00:00"}
