Personality Engines


Resources:

Wikipedia:

References:

See also:

Agent Persona InstrumentAutomated Personality 2018Engines Meta Guide | Persona Management | Personality Engineering


NPCs as People, Too: The Extreme AI Personality Engine
J Georgeson, C Child – arXiv preprint arXiv:1609.04879, 2016 – arxiv.org
PK Dick once asked” Do Androids Dream of Electric Sheep?” In video games, a similar question could be asked of non-player characters: Do NPCs have dreams? Can they live and change as humans do? Can NPCs have personalities, and can these develop through …

Managing Personality Influences in Dialogical Agents.
JP Sansonnet, F Bouchet – ICAART (1), 2013 – scitepress.org
… The objective is to separate designer-dependent resources (traits taxonomies, influence operators, behaviors/operators links) from the core part of the computational implementation (the personality engine) … Managing Influences with Personality Engines …

Getting virtually personal: chatbots who actively listen to you and infer your personality
MX Zhou, W Chen, Z Xiao, H Yang, T Chi… – Proceedings of the 24th …, 2019 – dl.acm.org
… To address all of the challenges, we have developed two sets of technologies: (1) a hybrid conversation engine that couples deep learning with a topic-based conversation model; and (2) an evidence-based personality engine that automatically mines a user’s conversation text …

Common sense knowledge based personality recognition from text
S Poria, A Gelbukh, B Agarwal, E Cambria… – … Conference on Artificial …, 2013 – Springer
… 4.3 Sentic Based Emotional Features In our present research we show how emotional clues can help to detect personality from the text. We used emotional features in the personality engine is to find out the role of emotional features to detect personality from text …

Trusting virtual agents: The effect of personality
MX Zhou, G Mark, J Li, H Yang – ACM Transactions on Interactive …, 2019 – dl.acm.org
… 3 SYSTEM OVERVIEW Figure 2 shows an overview of our system that supports automated interviews. An AI interviewer engages a user (interviewee) in a text-based conversation (c), powered by two core engines: (a) a personality engine and (b) a conversation engine …

NPCs as People, Too: The Extreme AI Personality Engine
CHT Child, J Georgeson – 2016 – openaccess.city.ac.uk
PK Dick once asked “Do Androids Dream of Electric Sheep?” In video games, a similar question could be asked of non-player characters: Do NPCs have dreams? Can they live and change as humans do? Can NPCs have personalities, and can these develop through …

NPCs Vote! Changing Voter Reactions Over Time Using the Extreme AI Personality Engine
J Georgeson – arXiv preprint arXiv:1609.05315, 2016 – arxiv.org
Can non-player characters have human-realistic personalities, changing over time depending on input from those around them? And can they have different reactions and thoughts about different people? Using Extreme AI, a psychology-based personality engine  …

Giving robots a flexible persona: The five factor model of artificial personality in action
K Sohn, S Krishnamoorthy, O Paul… – 2012 12th International …, 2012 – ieeexplore.ieee.org
… LTM remembers conversa- tions with people, which helps the robot recognize peo- ple and plays an important role in robot’s social behavior. This memory can extend over the lifetime of a robot. The Personality Engine is the heart of our AP archi- tecture …

Scalable honeypot architecture for identifying malicious network activities
GK Sadasivam, C Hota – 2015 international conference on …, 2015 – ieeexplore.ieee.org
… There are numerous advantages in a HoneyD system. It avoids evasion by fingerprinting tools through the presence of different personality engines. HoneyD emulates many operating systems using these personality engines …

How to Trick AI: Users’ Strategies for Protecting Themselves from Automatic Personality Assessment
ST Völkel, R Haeuslschmid, A Werner… – Proceedings of the …, 2020 – dl.acm.org
… purposes, but can be adapted to various use cases. The chatbot employs an evidence-based personality engine, building on tweets from 15 million Twitter users [82]. Based on demo- graphic information of these users, such …

A Framework Covering the Influence of ffm/neo pi-r Traits over the Dialogical Process of Rational Agents
JP Sansonnet, F Bouchet – International Conference on Agents and …, 2013 – Springer
… 2. Section 4 compares our approach to other attempts at implementing personality features in agents. 2 The Personality Engine. 2.1 An Enriched Personality Domain. The Traditional ffm/neo pi-r Taxonomy … 2.2 Architecture of a Personality Engine. Personality Engine Structure …

CE 817-Advanced Network Security Honeypots
M Kharrazi – Citeseer
… Fall 1393 Ce 817 -Lecture 12 Personality Engine • Why do we need Personality Engine? • Different operating system have different network stack behaviors … Fall 1393 Ce 817 -Lecture 12 Personality Engine • Ex?Personalities defined via Nmap fingerprint file • Create windows …

Web Based Honeypots Network
SS Rao, V Hegde, B Maneesh, JP NM… – International Journal of …, 2013 – academia.edu
… The primary architecture consists of a routing mechanism, a personality engine, a packet dispatcher and the service simulators. The most important of these is the personality engine, which gives services a different ‘avatar’for every operating system that they emulate …

Container based virtual honeynet for increased network security
N Memari, SJ Hashim… – 2015 5th National …, 2015 – ieeexplore.ieee.org
… Next, after realizing the packet content it will forwarded to personality engine to match the characteristics of operating system [3, 26]. Figure 3 illustrates the architecture of Honeyd. Fig … Fingerprints from personality engine for windows server 2008 can be seen below [26] …

Personality AI Development
J Wang, KV Nhan – 2018 – digitalcommons.wpi.edu
Page 1. Worcester Polytechnic Institute Digital WPI Major Qualifying Projects (All Years) Major Qualifying Projects December 2018 Personality AI Development Jiuchuan Wang Worcester Polytechnic Institute Kien V. Nhan Worcester Polytechnic Institute …

Software robot authoring tools for sharing intelligence among users and content providers
AR Khil, KH Lee, SK Kim – Multimedia Tools and Applications, 2015 – Springer
… It responds to incoming sensor information, and interacts with humans or its environment in real time. The Sobot artificial creature means the personality engine which can be embedded in a variety of artificial creatures … 4, the personality engine consists of five primary modules …

Chinese Automobile Preferences of Attributes at Xian Consumer: Under the Smart E-business Environments
SY Sik, CS Lee – e-??????, 2015 – dbpia.co.kr
… 3) This study in particular apprehended an optimal combination of automobile selection attributes through preference attribute analysis, such as brand type, fuel type, brand personality, engine displacement, and other characteristics among automobile selection attributes …

Honeypots: attacks expected
V Hankala – cs.helsinki.fi
… as generation of ICMP error messages, are controlled by the configuration database. The personality engine alters outgoing packets in order to mislead fingerprinting tools … honeypots that seem to run different operating systems. The personality engine uses in …

Research on Key Technologies of Personalized Education Resource Recommendation System Based on Big Data Environment
Y Cheng, X Bu – Journal of Physics: Conference Series, 2020 – iopscience.iop.org
… The application of the construction of personalized education resource recommendation system, combined with data preprocessing technology, personality engine recommendation, data mining technology and other issues and countermeasures …

A Malware Variant Resistant To Traditional Analysis Techniques
R Murali, A Ravi, H Agarwal – 2020 International Conference on …, 2020 – ieeexplore.ieee.org
… A. Detection Mechanism This version of the malware variant is vulnerable to static analysis of the PE bytecode. Using the static analysis techniques mentioned by [14], one can identify the split- personality engine of the malware …

Honeypots For Network Security
H SONI, P TRIPATHI, A GOYAL – National Conference on Security Issues …, 2012 – srgoc.org
… The primary architecture consists of a routing mechanism, a personality engine, a packet dispatcher and the service simulators. The most important of these is the personality engine, which gives services a different ‘avatar’ for every operating system that they emulate …

honeym: A framework for implementing virtual honeyclients for mobile devices
TJ O’Connor, B Sangster – Proceedings of the third ACM conference on …, 2010 – dl.acm.org
… a new discovery. Provos created the idea of a personality engine for honeyd [10]. Essentially, the personality engine advertises the specific behavior, personality, and vulnera- bilities for specific devices. In Provos’s implementation …

Hardening OS Identity by Customised Masking Techniques
R Kaur, M Singh – Thapar University, Punjab, India, 2014 – researchgate.net
… Different personalities can be assigned to different virtual honeypots. The personality engine of the honeypot makes network stack behave differently as specified by the changes into the protocol headers of every outgoing packet [11] …

Honeypots in network security
D Akkaya, F Thalgott – 2010 – diva-portal.org
… As it is seen processes are designed to create some returns which are created by personality engine to make it look good and logical according to our template for Honeyd. Page 17. 14 … The entire network stack is being implemented by Honeyd which name is personality engine …

New talent signals: Shiny new objects or a brave new world?
T Chamorro-Premuzic, D Winsborough… – Industrial and …, 2016 – cambridge.org
… New applications analyze e-mail communications and provide users with tips on how to respond to senders, based on their inferred personal- ity (http://bit.ly/1lkv5gB); others use speech-to-text tools and then parse the text through a personality engine (eg, HireVue.com) …

The dynamic honeypot design and implementation based on Honeyd
X Liu, L Peng, C Li – International Conference on Computer Science …, 2011 – Springer
… The Honeyd’s software frame Page 2. 94 X. Liu, L. Peng, and C. Li includes configuration database, central bag dispensers, agreement processor, personality engines and an optional routing component several parts. The structure is shown in figure 1: Fig …

U-PoT: A honeypot framework for UPnP-based IoT devices
MA Hakim, H Aksu, AS Uluagac… – 2018 IEEE 37th …, 2018 – ieeexplore.ieee.org
… It simulates the TCP/IP stack of an operating system and supports TCP, UDP, and ICMP protocols. To match the network behavior of the configured operating system, honeyd’s personality engine modifies the response packet before sending a response for incoming requests …

The arrival of observation based assessments
G Ramdhiansing, S Tuominen – 2018 – mevaluation.fi
… By using speech analysis, VoiceSense offers a variety of personality data. Their personality engine classifies typical speech patterns into distinctive personality styles. The test has been validated versus Big 5 and provide empirical evidence of measuring success …

Cyber threats monitoring: Experimental analysis of malware behavior in cyberspace
CM Colombini, A Colella, M Mattiucci… – … on Availability, Reliability …, 2013 – Springer
… In particular, Honeyd is a low-interaction honeypot that comprises several components (see Figure 1(a)): configuration database, a central packet dispatcher, protocol handlers and a personality engine. Incoming packets first go through the central packet dispatcher …

HoneySand: an open source tools based sandbox environment for Bot analysis and Botnet tracking
S Chamotra, RK Sehgal, R Kamal – Int. J. Comput. Appl. Commun. Secur …, 2012 – Citeseer
… analysis. Malware Execution machine Proxy engine Traffic Redirector IP emulator Packet Dispatcher TCP UDP ICMP Service emulator Proxy Personality Engine Honeypots Manipulati on scripts Real services Figure 2 The prototype …

IpMorph: fingerprinting spoofing unification
G Prigent, F Vichot, F Harrouet – Journal in computer virology, 2010 – Springer
… The packets modification mechanism is not very extensible (if-based implementation, switch/case in C language) and the field values are static. For now, it seems impossible to us to transform it into a generic personalities “engine” …

Repurposing defensive technologies for offensive Red Team operations
K Mladenov, A Zismer – 2017 – delaat.net
… telnet. Another outstanding feature of Honeyd is its personality engine which can simulate the TCP/IP stack of various operating systems. The TCP/IP fingerprints are stored in the same format as Nmap’s fingerprints. Therefore …

Can Robots and Humans Make Babies Together?
AD Cheok, EY Zhang – Human–Robot Intimate Relationships, 2019 – Springer
… with its external environment. The robot’s personality determines part or all of the robot’s behaviour, and its “personality engine” incorporates parameters that drive its motivation, homeostasis, and emotions. As with a human …

Assessing cybercrime through the eyes of the WOMBAT
M Dacier, C Leita, O Thonnard, H Van Pham… – Cyber Situational …, 2010 – Springer
… We configured Honeyd’s personality engine to emulate the presence of two different configurations, namely two identical virtual machines emulating Windows 2000 SP3, and one machine emulating a Linux Kernel 2.4.20. To the first two configurations (resp …

Honeypots for Network Security
R Karthikeyan, DT Geetha, S Vijayalakshmi… – International journal for …, 2017 – ijrdt.org
… The following treatment in this section is based on Niles Provost’ article [Pro04].The main components of Honeyed are a packet dispatcher, protocol handlers, a personality engine and a routing component. A configuration database specifies how the other components operate …

Evolving Ideas
A Nayyar – globalvisionpub.com
Page 1. 248 Hybrid Honeypot System Anand Nayyar1 ABSTRACT These days, different types of network attacks cum threats are causing massive damage to the Internet Community day by day. In order to defend from attacks …

Design and Development of Virtual Honeypot Framework based on Linux
A Girdhar, SG Kaur – 2012 – tudr.thapar.edu
Page 1. Design and Development of Virtual Honeypot Framework based on Linux Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering In Computer Science and Applications Submitted By Ashish Girdhar 601003003 …

HoneyPlc: A Next-generation Honeypot for Industrial Control Systems
EDL Morales – 2020 – search.proquest.com
Page 1. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems by Efrén Dar?o López Morales A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science Approved April 2020 by the Graduate Supervisory Committee …

Aim of the development of rural social infrastructure: a sustainable community
V Atkociuniene, G Vaznoniene… – … in Business & …, 2015 – researchgate.net
… In this viewpoint, a lot of attention falls onto the characters of rural expansion and especially the leaders of various spheres: to the most active ones, the so-called “personalities-engines”, members of the community, which can strive towards changes useful for their residents …

Activation of the Under-windows Honey pot in Presenting a Factitious Networking
AA Saadatmand, BEB Nejad, CM Mosleh – Citeseer
… Honeyd’s architecture consists of several components: configuration database, package dispatching center, protocol’s controller, personality engine and arbitrary navigation section, which all are illustrated in figure 1. Page 4 …

HoneyIo4: the construction of a virtual, low-interaction IoT Honeypot
A Guerra Manzanares – 2017 – upcommons.upc.edu
… Before sending a response packet to the network, the packet is modified by Honeyd’s personality engine to match the network behavior of the configured operating system personality” [11] … Before any packet is sent to the network, it is processed by the personality engine …

Using honeypots to study skill level of attackers based on the exploited vulnerabilities in the network
V Aliyev – 2010 – publications.lib.chalmers.se
… You can see the Honeyd?s architecture in Figure 5.2. Figure 5.2 Honeyd architecture [3] Honeyd?s architecture consists of components such as a packet dispatcher, a configuration database, protocol handlers, and a personality engine …

Biometric Mirror: Exploring Ethical Opinions towards Facial Analysis and Automated Decision-Making
N Wouters, R Kelly, E Velloso, K Wolf… – Proceedings of the …, 2019 – dl.acm.org
Page 1. Biometric Mirror: Exploring Values and Attitudes towards Facial Analysis and Automated Decision-Making Niels Wouters1, Ryan Kelly1, Eduardo Velloso1, Katrin Wolf2, 1, Hasan Shahid Ferdous1, Joshua Newn1, Zaher …

CSc 566, Computer Security Research Reports
J Shi, S Saleem, M Gibbens, H vardhan Rajendran… – 2012 – cs.arizona.edu
Page 1. CSc 566, Computer Security Research Reports Junxiao Shi, Sara Saleem, Mathias Gibbens, Harsha vardhan Rajendran, Balaji Prasad TK, Nupur Maheshwari, Paul Mueller, Babak Yadegari, Matthew Ward, Paul Jennas …

Honeypot Architectures for IPv6 Networks
S Schindler, B Schnor – 2016 – cs.uni-potsdam.de
… 60 4.5.2 Fingerprinting in IPv6 Networks . . . . . 62 4.5.3 Implementation of an IPv6 Personality Engine for Honeydv6 . . . . . 65 4.6 Honeydv6 Performance Evaluation . . . . . 69 4.6.1 IPv4 and IPv6 Throughput Comparison …

Automatic XSS detection and Snort signatures/ACLs generation by the means of a cloud-based honeypot system
B Jacob – no. December, 2011 – Citeseer
Page 1. – Automatic XSS detection and Snort signatures/ ACLs generation by the means of a cloud-based honeypot system Benoit Jacob 08009764 Submitted in partial fulfilment of the requirements of Edinburgh Napier University for the degree of Msc Advanced Networking …

Deployment of Low Interaction Honeypots in University Campus Network
E Chairetakis, B Alkudhir, P Mystridis – 2013 – diva-portal.org
Page 1. Master’s Program in Computer Network Engineering, 60 ECTS Deployment of Low Interaction Honeypots in University Campus Network Bassam Alkudhir, Eleftherios Chairetakis & Panagiotis Mystridis Master Thesis 15 ECTS Halmstad 2013 MASTER THESIS Page 2. II …

A game-theoretic analysis to defend against remote operating system fingerprinting
MA Rahman, MGMM Hasan, MH Manshaei… – Journal of Information …, 2020 – Elsevier
JavaScript is disabled on your browser. Please enable JavaScript to use all the features on this page. Skip to main content Skip to article …

Survey of Research and Data Collection Initiatives in Malware and Fraud
NOF EXCELLENCE – syssec-project.eu
… Services Personality Engine Network … Handlers send the traffic to specific services based on the destination port. The responses from the services (red dotted lines) are sent back to the routing process, which consults the personality engine before injecting them to the network …

Reconfigurable Architectures and Design Automation Tools for Application-Level Network Security
S Mühlbach – 2015 – books.google.com
Page 1. Reconfigurable Architectures and Design Automation Tools for Application- Level Network Security T º … S. | inter-?ºe Pº – | ºt * -º-º- – LE. Mºh?-tº- Tirrºr- ºrwic- Sascha Mühlbach alºa Applicatiºn | sº ºrwººtº Moyog. Page 2. Page 3 …

(Visited 44 times, 1 visits today)