-
1
-
-
0025210722
-
An architecture for adversarial planning
-
January/February
-
Applegate, C., Elsaesser, C., & Sanborn, J., "An Architecture for Adversarial Planning," IEEE Transactions on Systems, Man, and Cybernetics, 20 (1), January/February 1990, pp. 186-194.
-
(1990)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.20
, Issue.1
, pp. 186-194
-
-
Applegate, C.1
Elsaesser, C.2
Sanborn, J.3
-
2
-
-
17644406893
-
-
New York: Transaction Publishing
-
Bell, J. B., & Whaley, B., Cheating, New York: Transaction Publishing, 1991.
-
(1991)
Cheating
-
-
Bell, J.B.1
Whaley, B.2
-
4
-
-
0004503084
-
Counterplanning: A strategy-based model of adversary planning in real-world situations
-
Carbonell, J., "Counterplanning: A Strategy-Based Model of Adversary Planning in Real-World Situations," Artificial Intelligence, Vol. 16, 1981, pp. 295-329.
-
(1981)
Artificial Intelligence
, vol.16
, pp. 295-329
-
-
Carbonell, J.1
-
6
-
-
0038103909
-
Leading attackers through attack graphs with deceptions
-
Cohen, F., & Koike, D., "Leading Attackers through Attack Graphs with Deceptions," Computers and Security, Vol. 22, no. 5, pp. 402-411, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.5
, pp. 402-411
-
-
Cohen, F.1
Koike, D.2
-
7
-
-
0345015442
-
Can computers deliberately deceive? A simulation tool and its application to turing's imitation game
-
DeRcsis, F., Castelfranchi, C., Carofiglio, V., & Grassano, R., "Can Computers Deliberately Deceive? A Simulation Tool and its Application to Turing's Imitation Game," Computational Intelligence, Vol. 19, No. 3, 2003, pp. 235-263.
-
(2003)
Computational Intelligence
, vol.19
, Issue.3
, pp. 235-263
-
-
Dercsis, F.1
Castelfranchi, C.2
Carofiglio, V.3
Grassano, R.4
-
8
-
-
17644382131
-
-
San Jose, CA: Writers Club Press
-
Dunnigan, J. F., & Nofi, A. A., Victory and Deceit, second edition: Deception and Trickery in War, San Jose, CA: Writers Club Press, 2001.
-
(2001)
Victory and Deceit, Second Edition: Deception and Trickery in War
-
-
Dunnigan, J.F.1
Nofi, A.A.2
-
10
-
-
21644440590
-
-
PM-1124-NSA, Rand National Defense Research Institute, November
-
Gerwehr, S., Weissler, R., Medby, J. J., Anderson, R. H., & Rothenberg, J., "Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities," PM-1124-NSA, Rand National Defense Research Institute, November 2000.
-
(2000)
Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities
-
-
Gerwehr, S.1
Weissler, R.2
Medby, J.J.3
Anderson, R.H.4
Rothenberg, J.5
-
11
-
-
3843119704
-
Cognitive factors in deception and counterdeception
-
ed. Daniel, D. C., & Herbig, K. L., New York: Pergamon
-
Heuer, R. J., "Cognitive Factors in Deception and Counterdeception," In Strategic Military Deception, ed. Daniel, D. C., & Herbig, K. L., New York: Pergamon, 1982, pp. 31-69.
-
(1982)
Strategic Military Deception
, pp. 31-69
-
-
Heuer, R.J.1
-
12
-
-
21644463587
-
The honeynet project
-
Boston: Addison-Wesley
-
The Honeynet Project, Know Your Enemy. Boston: Addison-Wesley, 2002.
-
(2002)
Know Your Enemy
-
-
-
13
-
-
0347608169
-
A logic for uncertain probabilities
-
June
-
Josang, A., "A Logic for Uncertain Probabilities," Int. Jnl. of Uncertainty, Fuzziness, and Knowledge-Based Systems, Vol. 9, No. 3, June 2001, pp. 279-311.
-
(2001)
Int. Jnl. of Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Josang, A.1
-
16
-
-
0039847342
-
A probability model of accuracy in deception detection experiments
-
June
-
Park, H. S., & Levine, T. R., "A Probability Model of Accuracy in Deception Detection Experiments," Communication Monographs, Vol. 68, No. 2 (June), 2001, 201-210.
-
(2001)
Communication Monographs
, vol.68
, Issue.2
, pp. 201-210
-
-
Park, H.S.1
Levine, T.R.2
-
18
-
-
17644370860
-
Counterplanning deceptions to foil cyber-attack plans
-
West Point, NY, June
-
Rowe, N., "Counterplanning Deceptions to Foil Cyber-Attack Plans," Proc. IEEE-SMC Workshop on Information Assurance, West Point, NY, June 2003, pp. 203-211.
-
(2003)
Proc. IEEE-SMC Workshop on Information Assurance
, pp. 203-211
-
-
Rowe, N.1
-
19
-
-
21644437899
-
Two taxonomies of deception for attacks on information systems
-
July
-
Rowe, N., & Rothstein, H., "Two Taxonomies of Deception for Attacks on Information Systems," Journal of Information Warfare, Vol. 3, No. 2, July 2004, pp. 27-39.
-
(2004)
Journal of Information Warfare
, vol.3
, Issue.2
, pp. 27-39
-
-
Rowe, N.1
Rothstein, H.2
-
20
-
-
0004058336
-
-
New York: Wiley
-
Snyder, C. R., Higgins, R. L., and Stucky, R. J., Excuses: masquerades in search of grace, New York: Wiley, 1983.
-
(1983)
Excuses: Masquerades in Search of Grace
-
-
Snyder, C.R.1
Higgins, R.L.2
Stucky, R.J.3
-
22
-
-
0002249231
-
-
London: Cambridge University Press
-
Sztompka, P., Trust, London: Cambridge University Press, 1999.
-
(1999)
Trust
-
-
Sztompka, P.1
-
23
-
-
0034593179
-
A requires/provides model for computer attacks
-
Cork, Ireland, September
-
Templeton, S., & Levitt, K., "A Requires/Provides Model for Computer Attacks," Proc. of the New Security Paradigms Workshop, Cork, Ireland, September 2000.
-
(2000)
Proc. of the New Security Paradigms Workshop
-
-
Templeton, S.1
Levitt, K.2
-
24
-
-
0027814618
-
Principles, techniques, and ethics of stage magic and their application to human interface design
-
Amsterdam, April
-
Tognazzini, B., "Principles, Techniques, and Ethics of Stage Magic and their Application to Human Interface Design," Proc. Conference on Human Factors and Computing Systems (INTERCHI) 1993, Amsterdam, April 1993, pp. 355-362.
-
(1993)
Proc. Conference on Human Factors and Computing Systems (INTERCHI) 1993
, pp. 355-362
-
-
Tognazzini, B.1
-
25
-
-
84947193501
-
Towards a general theory of deception
-
March
-
Whaley, B., "Towards a General Theory of Deception," Journal of Strategic Studies, Vol. 5, No. 1, March 1982, pp. 179-193.
-
(1982)
Journal of Strategic Studies
, vol.5
, Issue.1
, pp. 179-193
-
-
Whaley, B.1
|