메뉴 건너뛰기




Volumn , Issue , 2007, Pages 31-38

Inconsistency in deception for defense

Author keywords

Deception; Inconsistency; Operating systems; Security

Indexed keywords

DECEPTION; SYSTEMATIC METHODS;

EID: 36949010970     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1278940.1278946     Document Type: Conference Paper
Times cited : (17)

References (22)
  • 2
    • 84943181391 scopus 로고    scopus 로고
    • Ascribing and Weighting Beliefs in Deceptive Information Exchanges
    • Springer-Verlag, Berlin pp
    • Carofiglio, V., de Rosis, F., and Castelfranchi, C. "Ascribing and Weighting Beliefs in Deceptive Information Exchanges," User Modeling, Springer-Verlag, Berlin pp. 222-224 (2001).
    • (2001) User Modeling , pp. 222-224
    • Carofiglio, V.1    de Rosis, F.2    Castelfranchi, C.3
  • 3
    • 0010601078 scopus 로고    scopus 로고
    • Artificial Liars: Why Computers Will (Necessarily) Deceive Us and Each Other
    • Castelfranchi, C. "Artificial Liars: Why Computers Will (Necessarily) Deceive Us and Each Other," Ethics and Information Technology 2 (2) pp. 113-119 (2000).
    • (2000) Ethics and Information Technology , vol.2 , Issue.2 , pp. 113-119
    • Castelfranchi, C.1
  • 4
    • 0040334871 scopus 로고
    • Lying as Pretending to Give Information
    • H. Parret ed, Springer Verlag, Berlin
    • Castelfranchi, C., and Poggi, I. "Lying as Pretending to Give Information," Pretending to Communicate, H. Parret (ed), Springer Verlag, Berlin (1993).
    • (1993) Pretending to Communicate
    • Castelfranchi, C.1    Poggi, I.2
  • 5
    • 0009016272 scopus 로고
    • An Evening with Berferd, in Which a Cracker is Lured, Endured, and Studied
    • Jan
    • Cheswick, W. "An Evening with Berferd, in Which a Cracker is Lured, Endured, and Studied," Proceedings of the Winter 1992 USENIX Conference pp. 163-173, (Jan. 1992).
    • (1992) Proceedings of the Winter 1992 USENIX Conference , pp. 163-173
    • Cheswick, W.1
  • 7
    • 36949020786 scopus 로고    scopus 로고
    • The Laws of Thought
    • Spring
    • Danaher, J. "The Laws of Thought," The Philosopher 92(1) (Spring 2004).
    • (2004) The Philosopher , vol.92 , Issue.1
    • Danaher, J.1
  • 9
    • 84942883016 scopus 로고    scopus 로고
    • The Socio-Cognitive Dynamics of Trust: Does Trust Create Trust?
    • Springer-Verlag, Berlin pp
    • Falcone, R., and Castelfranchi, C. "The Socio-Cognitive Dynamics of Trust: Does Trust Create Trust?" Trust in Cyber-societies, Springer-Verlag, Berlin pp. 55-72 (2001).
    • (2001) Trust in Cyber-societies , pp. 55-72
    • Falcone, R.1    Castelfranchi, C.2
  • 10
    • 36949035099 scopus 로고
    • The Uses of Inconsistency
    • June
    • Gotesky, "The Uses of Inconsistency "Philosophy and PhenomenologicalResearch 28 (4) pp. 471-500 (June 1968).
    • (1968) Philosophy and PhenomenologicalResearch , vol.28 , Issue.4 , pp. 471-500
    • Gotesky1
  • 13
    • 36949015775 scopus 로고    scopus 로고
    • Phase II-Report on Intelligent Software Decoys: Counterintelligence and Security Countermeasures
    • Technical Report, Naval Postgraduate School, Monterey, CA Apr
    • Michael, J., Rowe, N., Auguston, M., Drusinsky, D., Rothstein, H., and Wingfield, T. Phase II-Report on Intelligent Software Decoys: Counterintelligence and Security Countermeasures, Technical Report, Naval Postgraduate School, Monterey, CA (Apr. 2004).
    • (2004)
    • Michael, J.1    Rowe, N.2    Auguston, M.3    Drusinsky, D.4    Rothstein, H.5    Wingfield, T.6
  • 14
    • 0036387039 scopus 로고    scopus 로고
    • Michael, J. On the Response Policy of Software Decoys: Conducting Software-based Deception in the Cyber Battlespace, Proceedings of the 26th Annual International Computer Software and Applications Conference pp. 957-962 Aug. 2002
    • Michael, J. "On the Response Policy of Software Decoys: Conducting Software-based Deception in the Cyber Battlespace," Proceedings of the 26th Annual International Computer Software and Applications Conference pp. 957-962 (Aug. 2002).
  • 15
    • 36949026353 scopus 로고
    • J. B. Lippincott Company, Philadelphia, PA
    • Montagu, E. The Man Who Never Was, J. B. Lippincott Company, Philadelphia, PA (1954).
    • (1954) The Man Who Never Was
    • Montagu, E.1
  • 17
    • 33747164512 scopus 로고    scopus 로고
    • Paraconsistent Logic
    • E. Zalta, ed, Winter, available at
    • Priest G., and Tanaka, K. "Paraconsistent Logic," The Stanford Encyclopedia of Philosophy, E. Zalta, ed. (Winter 2004); available at http://plato.stanford.edu/archives/win2004/entries/logicparaconsi stent/.
    • (2004) The Stanford Encyclopedia of Philosophy
    • Priest, G.1    Tanaka, K.2
  • 18
    • 36949016190 scopus 로고    scopus 로고
    • Master's Thesis, Dept. of Computer Science, University of California at Davis, Davis, CA June
    • Rogers, D. Host-Level Deception as a Defense Against Intruders, Master's Thesis., Dept. of Computer Science, University of California at Davis, Davis, CA (June 2004).
    • (2004) Host-Level Deception as a Defense Against Intruders
    • Rogers, D.1
  • 19
    • 36949014713 scopus 로고    scopus 로고
    • Counterplanning Deceptions to Foil Cyber-Attack Plans
    • June
    • Rowe, N. "Counterplanning Deceptions to Foil Cyber-Attack Plans," IEEE Workshop on Information Assurance pp. 221-228 (June 2003).
    • (2003) IEEE Workshop on Information Assurance , pp. 221-228
    • Rowe, N.1
  • 20
    • 36949004275 scopus 로고    scopus 로고
    • Software Decoys for Software Counterintelligence
    • Spring
    • Rowe, N., Michael, J, Auguston, M., and Riehle, R. "Software Decoys for Software Counterintelligence," IA Newsletter S (1) pp. 10-12 (Spring 2002).
    • (2002) IA Newsletter S , pp. 10-12
    • Rowe, N.1    Michael, J.2    Auguston, M.3    Riehle, R.4
  • 21
    • 0024011325 scopus 로고
    • Stalking the Wily Hacker
    • May
    • Stall, C. "Stalking the Wily Hacker, " Communications of the ACM 31 (5) pp. 484-497 (May 1988).
    • (1988) Communications of the ACM , vol.31 , Issue.5 , pp. 484-497
    • Stall, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.