{"batchcomplete":"","continue":{"lecontinue":"20241027200502|371","continue":"-||"},"query":{"logevents":[{"logid":381,"ns":0,"title":"Habituation","pageid":374,"logpage":374,"revid":508,"params":{},"type":"create","action":"create","user":"Info","timestamp":"2025-11-03T22:52:37Z","comment":"Created page with \"== '''Vigilance''' ==  '''Short Description:''' Habituation is a form of non-associative learning   <br>  '''CAT ID:''' CAT-2025-002 <br>  '''Layer:'''  8 <br>  '''Operational Scale:''' Tactical <br>  '''Level of Maturity:''' In Common Use <br>  '''Category:'''  Exploit <br>  '''Subcategory:'''  <br>  '''Also Known As:''' <br>  == '''Description:''' ==  '''Closely Related Concepts:'''  <br>  '''Mechanism:'''  <br>  '''Multipliers:'''   <br>  '''Detailed Description:'''...\""},{"logid":380,"ns":0,"title":"Vigilance","pageid":373,"logpage":373,"revid":505,"params":{},"type":"create","action":"create","user":"Info","timestamp":"2025-11-03T22:22:19Z","comment":"Created page with \"== '''Vigilance''' ==  '''Short Description:'''   <br>  '''CAT ID:''' CAT-2025-001 <br>  '''Layer:'''  8 <br>  '''Operational Scale:''' Tactical <br>  '''Level of Maturity:''' In Common Use <br>  '''Category:'''  Vulnerability <br>  '''Subcategory:'''  <br>  '''Also Known As:''' <br>  == '''Description:''' ==  '''Closely Related Concepts:'''  <br>  '''Mechanism:'''  <br>  '''Multipliers:'''   <br>  '''Detailed Description:'''  <br>  '''INTERACTIONS''' [VETs]: Misdirect...\""},{"logid":379,"ns":0,"title":"Interpreting the Cognitive Attack Taxonomy","pageid":372,"logpage":372,"revid":485,"params":{},"type":"create","action":"create","user":"Info","timestamp":"2024-11-17T23:27:47Z","comment":"Created page with \"= '''<big>Introduction to the Cognitive Attack Taxonomy (CAT)</big>''' =  \u201cHacking\u201d refers to manipulating objects, systems, processes, or technologies in ways not originally intended to produce outcomes not otherwise achievable, or would be much more difficult to achieve, through conventional means. Extending the concept which was originally used within the model train community, then extended to the programming and software development community, then adapted to th...\""},{"logid":378,"ns":0,"title":"QRishing","pageid":371,"logpage":371,"revid":471,"params":{},"type":"create","action":"create","user":"Info","timestamp":"2024-11-06T07:01:28Z","comment":"Created page with \"== '''Quishing  ''' ==  '''Short Description:'''  Phishing variant employing QR codes<ref>Schlienger, T., Teufel, S., & Wolff, C. (2013). QRishing: The susceptibility of smartphone users to QR code phishing attacks. In M. Bezzi, P. Dupr\u00e9, & D. Naccache (Eds.), Emerging Security Information, Systems and Technologies (pp. 80-87). Springer. https://doi.org/10.1007/978-3-642-41320-9_4</ref>. <br>  '''CAT ID:''' CAT-2024-011 <br>  '''Layer:'''  8 <br>  '''Operational Scale:'...\""},{"logid":377,"ns":6,"title":"File:DecoyEffect.jpg","pageid":370,"logpage":370,"revid":458,"params":{},"type":"create","action":"create","user":"Info","timestamp":"2024-10-30T03:44:55Z","comment":""},{"logid":376,"ns":6,"title":"File:DecoyEffect.jpg","pageid":370,"logpage":370,"revid":458,"params":{"img_sha1":"q6dkbpvt5sq6jursx8e93srt8h8gzqe","img_timestamp":"2024-10-30T03:44:55Z"},"type":"upload","action":"upload","user":"Info","timestamp":"2024-10-30T03:44:55Z","comment":""},{"logid":375,"ns":6,"title":"File:FalseFeedback.jpg","pageid":369,"logpage":369,"revid":455,"params":{},"type":"create","action":"create","user":"Info","timestamp":"2024-10-30T03:39:26Z","comment":""},{"logid":374,"ns":6,"title":"File:FalseFeedback.jpg","pageid":369,"logpage":369,"revid":455,"params":{"img_sha1":"pg1brojqry6fhmgtzf9gjf6vskripy3","img_timestamp":"2024-10-30T03:39:26Z"},"type":"upload","action":"upload","user":"Info","timestamp":"2024-10-30T03:39:26Z","comment":""},{"logid":373,"ns":6,"title":"File:SL-AG.jpg","pageid":368,"logpage":368,"revid":451,"params":{},"type":"create","action":"create","user":"Info","timestamp":"2024-10-30T02:59:53Z","comment":"SL AG Test"},{"logid":372,"ns":6,"title":"File:SL-AG.jpg","pageid":368,"logpage":368,"revid":451,"params":{"img_sha1":"6wgailizfgni1ap0oder292apmwizoy","img_timestamp":"2024-10-30T02:59:53Z"},"type":"upload","action":"upload","user":"Info","timestamp":"2024-10-30T02:59:53Z","comment":"SL AG Test"}]}}