“…Cognitive models have been used as embedded computational agents to simulate human interactions with software and networks (Gonzalez et al, 2014;Mitsopoulos et al, 2021;Veksler et al, 2020). Previous work has focused independently on understanding defense behaviors and developing cognitive models of blue agents (Du et al, 2022;Dutt et al, 2011), or the attack preferences and biases of the attacker (Cranford et al, 2020). However, the attacker and the defender are influenced by each other in adversarial cyber scenarios (West & Lebiere, 2001), and such dynamics between attackers and defenders can make defenders more vulnerable to such adversarial actions compared to even random attackers (Moisan & Gonzalez, 2017).…”