-
2
-
-
84943181391
-
Ascribing and Weighting Beliefs in Deceptive Information Exchanges
-
Springer-Verlag, Berlin pp
-
Carofiglio, V., de Rosis, F., and Castelfranchi, C. "Ascribing and Weighting Beliefs in Deceptive Information Exchanges," User Modeling, Springer-Verlag, Berlin pp. 222-224 (2001).
-
(2001)
User Modeling
, pp. 222-224
-
-
Carofiglio, V.1
de Rosis, F.2
Castelfranchi, C.3
-
3
-
-
0010601078
-
Artificial Liars: Why Computers Will (Necessarily) Deceive Us and Each Other
-
Castelfranchi, C. "Artificial Liars: Why Computers Will (Necessarily) Deceive Us and Each Other," Ethics and Information Technology 2 (2) pp. 113-119 (2000).
-
(2000)
Ethics and Information Technology
, vol.2
, Issue.2
, pp. 113-119
-
-
Castelfranchi, C.1
-
4
-
-
0040334871
-
Lying as Pretending to Give Information
-
H. Parret ed, Springer Verlag, Berlin
-
Castelfranchi, C., and Poggi, I. "Lying as Pretending to Give Information," Pretending to Communicate, H. Parret (ed), Springer Verlag, Berlin (1993).
-
(1993)
Pretending to Communicate
-
-
Castelfranchi, C.1
Poggi, I.2
-
5
-
-
0009016272
-
An Evening with Berferd, in Which a Cracker is Lured, Endured, and Studied
-
Jan
-
Cheswick, W. "An Evening with Berferd, in Which a Cracker is Lured, Endured, and Studied," Proceedings of the Winter 1992 USENIX Conference pp. 163-173, (Jan. 1992).
-
(1992)
Proceedings of the Winter 1992 USENIX Conference
, pp. 163-173
-
-
Cheswick, W.1
-
6
-
-
0038643294
-
-
available at
-
Cohen, F., Marin, I., Sappington, J., Stewart, C., and Thomas, E. "Red Teaming Experiments with Deception Technologies" (2001); available at http://all.net/journal/deception/experiments/experiments.html
-
(2001)
Red Teaming Experiments with Deception Technologies
-
-
Cohen, F.1
Marin, I.2
Sappington, J.3
Stewart, C.4
Thomas, E.5
-
7
-
-
36949020786
-
The Laws of Thought
-
Spring
-
Danaher, J. "The Laws of Thought," The Philosopher 92(1) (Spring 2004).
-
(2004)
The Philosopher
, vol.92
, Issue.1
-
-
Danaher, J.1
-
8
-
-
0345015442
-
Can Computers Deliberately Deceive?
-
Aug
-
de Rosis, F., Castelfranchi, C., Carofiglio, V., and Grassano, G. "Can Computers Deliberately Deceive?" Computational Intelligence 19 (3) p. 235 (Aug. 2003).
-
(2003)
Computational Intelligence
, vol.19
, Issue.3
, pp. 235
-
-
de Rosis, F.1
Castelfranchi, C.2
Carofiglio, V.3
Grassano, G.4
-
9
-
-
84942883016
-
The Socio-Cognitive Dynamics of Trust: Does Trust Create Trust?
-
Springer-Verlag, Berlin pp
-
Falcone, R., and Castelfranchi, C. "The Socio-Cognitive Dynamics of Trust: Does Trust Create Trust?" Trust in Cyber-societies, Springer-Verlag, Berlin pp. 55-72 (2001).
-
(2001)
Trust in Cyber-societies
, pp. 55-72
-
-
Falcone, R.1
Castelfranchi, C.2
-
10
-
-
36949035099
-
The Uses of Inconsistency
-
June
-
Gotesky, "The Uses of Inconsistency "Philosophy and PhenomenologicalResearch 28 (4) pp. 471-500 (June 1968).
-
(1968)
Philosophy and PhenomenologicalResearch
, vol.28
, Issue.4
, pp. 471-500
-
-
Gotesky1
-
11
-
-
35048866324
-
Symantec Deception Server: Experience with a Commercial Deception System
-
Sep
-
Hernacki, B., Bennett, J., and Lofgran, T. "Symantec Deception Server: Experience with a Commercial Deception System," Proceedings of the Seventh International Symposium in Resent Advances in Intrusion Detection pp. 188-202 (Sep. 2004).
-
(2004)
Proceedings of the Seventh International Symposium in Resent Advances in Intrusion Detection
, pp. 188-202
-
-
Hernacki, B.1
Bennett, J.2
Lofgran, T.3
-
12
-
-
84873157353
-
Software Decoys: Intrusion Detection and Countermeasures
-
June
-
Michael, J., Auguston, M., Rowe, N., and Riehle, R. "Software Decoys: Intrusion Detection and Countermeasures," Proceedings of the 2002 Workshop on Information Assurance (June 2002).
-
(2002)
Proceedings of the 2002 Workshop on Information Assurance
-
-
Michael, J.1
Auguston, M.2
Rowe, N.3
Riehle, R.4
-
13
-
-
36949015775
-
Phase II-Report on Intelligent Software Decoys: Counterintelligence and Security Countermeasures
-
Technical Report, Naval Postgraduate School, Monterey, CA Apr
-
Michael, J., Rowe, N., Auguston, M., Drusinsky, D., Rothstein, H., and Wingfield, T. Phase II-Report on Intelligent Software Decoys: Counterintelligence and Security Countermeasures, Technical Report, Naval Postgraduate School, Monterey, CA (Apr. 2004).
-
(2004)
-
-
Michael, J.1
Rowe, N.2
Auguston, M.3
Drusinsky, D.4
Rothstein, H.5
Wingfield, T.6
-
14
-
-
0036387039
-
-
Michael, J. On the Response Policy of Software Decoys: Conducting Software-based Deception in the Cyber Battlespace, Proceedings of the 26th Annual International Computer Software and Applications Conference pp. 957-962 Aug. 2002
-
Michael, J. "On the Response Policy of Software Decoys: Conducting Software-based Deception in the Cyber Battlespace," Proceedings of the 26th Annual International Computer Software and Applications Conference pp. 957-962 (Aug. 2002).
-
-
-
-
15
-
-
36949026353
-
-
J. B. Lippincott Company, Philadelphia, PA
-
Montagu, E. The Man Who Never Was, J. B. Lippincott Company, Philadelphia, PA (1954).
-
(1954)
The Man Who Never Was
-
-
Montagu, E.1
-
17
-
-
33747164512
-
Paraconsistent Logic
-
E. Zalta, ed, Winter, available at
-
Priest G., and Tanaka, K. "Paraconsistent Logic," The Stanford Encyclopedia of Philosophy, E. Zalta, ed. (Winter 2004); available at http://plato.stanford.edu/archives/win2004/entries/logicparaconsi stent/.
-
(2004)
The Stanford Encyclopedia of Philosophy
-
-
Priest, G.1
Tanaka, K.2
-
18
-
-
36949016190
-
-
Master's Thesis, Dept. of Computer Science, University of California at Davis, Davis, CA June
-
Rogers, D. Host-Level Deception as a Defense Against Intruders, Master's Thesis., Dept. of Computer Science, University of California at Davis, Davis, CA (June 2004).
-
(2004)
Host-Level Deception as a Defense Against Intruders
-
-
Rogers, D.1
-
19
-
-
36949014713
-
Counterplanning Deceptions to Foil Cyber-Attack Plans
-
June
-
Rowe, N. "Counterplanning Deceptions to Foil Cyber-Attack Plans," IEEE Workshop on Information Assurance pp. 221-228 (June 2003).
-
(2003)
IEEE Workshop on Information Assurance
, pp. 221-228
-
-
Rowe, N.1
-
20
-
-
36949004275
-
Software Decoys for Software Counterintelligence
-
Spring
-
Rowe, N., Michael, J, Auguston, M., and Riehle, R. "Software Decoys for Software Counterintelligence," IA Newsletter S (1) pp. 10-12 (Spring 2002).
-
(2002)
IA Newsletter S
, pp. 10-12
-
-
Rowe, N.1
Michael, J.2
Auguston, M.3
Riehle, R.4
-
21
-
-
0024011325
-
Stalking the Wily Hacker
-
May
-
Stall, C. "Stalking the Wily Hacker, " Communications of the ACM 31 (5) pp. 484-497 (May 1988).
-
(1988)
Communications of the ACM
, vol.31
, Issue.5
, pp. 484-497
-
-
Stall, C.1
|