-
1
-
-
0003795084
-
-
New York: McGraw-Hill Osborne Media
-
McClure, S., Scambray, J., and Kurtz, G., Hacking Exposed: Network Security Secrets and Solutions, third edition. New York: McGraw-Hill Osborne Media, 2001.
-
(2001)
Hacking Exposed: Network Security Secrets and Solutions, Third Edition
-
-
McClure, S.1
Scambray, J.2
Kurtz, G.3
-
3
-
-
0010646470
-
Tactical deception in air-land warfare
-
June
-
Fowler, C. A., and Nesbit, R. F., Tactical deception in air-land warfare. Journal of Electronic Defense, Vol. 18, No. 6 (June 1995), pp. 37-44 & 76-79.
-
(1995)
Journal of Electronic Defense
, vol.18
, Issue.6
-
-
Fowler, C.A.1
Nesbit, R.F.2
-
4
-
-
17644382131
-
-
San Jose, CA: Writers Club Press
-
Dunnigan, J. F., and Nofi, A. A., Victory and Deceit, second edition: Deception and Trickery in War. San Jose, CA: Writers Club Press, 2001.
-
(2001)
Victory and Deceit, Second Edition: Deception and Trickery in War
-
-
Dunnigan, J.F.1
Nofi, A.A.2
-
5
-
-
84873157353
-
Software decoys: Intrusion detection and countermeasures
-
Michael, B., Auguston, M., Rowe, N., and Riehle, R., Software decoys: intrusion detection and countermeasures. Proc. 2002 Workshop on Information Assurance, West Point, NY, June 2002.
-
Proc. 2002 Workshop on Information Assurance, West Point, NY, June 2002
-
-
Michael, B.1
Auguston, M.2
Rowe, N.3
Riehle, R.4
-
6
-
-
0004503084
-
Counterplanning: A strategy-based model of adversary planning in real-world situations
-
Carbonell, J., Counterplanning: A strategy-based model of adversary planning in real-world situations, Artificial Intelligence, Vol. 16, 1981, pp. 295-329.
-
(1981)
Artificial Intelligence
, vol.16
, pp. 295-329
-
-
Carbonell, J.1
-
7
-
-
0025210722
-
An architecture for adversarial planning
-
January/February
-
Applegate, C., Elsaesser, C., and Sanborn, J., An architecture for adversarial planning, IEEE Transactions on Systems, Man, and Cybernetics, 20 (1), January/February 1990, pp. 186-194.
-
(1990)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.20
, Issue.1
, pp. 186-194
-
-
Applegate, C.1
Elsaesser, C.2
Sanborn, J.3
-
8
-
-
4644252192
-
Inhibiting adaptation
-
Carley, K., Inhibiting adaptation, Proc. Command and Control Research and Technology Symposium, Monterey CA, USA, June 2002.
-
Proc. Command and Control Research and Technology Symposium, Monterey CA, USA, June 2002
-
-
Carley, K.1
-
9
-
-
84964467431
-
An initial foray into understanding adversary planning and courses of action
-
Lowry, J., An initial foray into understanding adversary planning and courses of action. Proc. DARPA Information Survivability Conference & Exposition II, Anaheim, CA, June 2001, vol. 1, pp. 123-133.
-
Proc. DARPA Information Survivability Conference & Exposition II, Anaheim, CA, June 2001
, vol.1
, pp. 123-133
-
-
Lowry, J.1
-
11
-
-
0032070119
-
An authoring system for intelligent procedural-skill tutors
-
May/June
-
Rowe, N., and Galvin, T., An authoring system for intelligent procedural-skill tutors, IEEE Intelligent Systems, 13(3), May/June 1998, pp. 61-69.
-
(1998)
IEEE Intelligent Systems
, vol.13
, Issue.3
, pp. 61-69
-
-
Rowe, N.1
Galvin, T.2
-
12
-
-
0346940209
-
An intelligent tutor for intrusion detection on computer systems
-
Rowe, N., and Schiavo, S., An intelligent tutor for intrusion detection on computer systems, Computers and Education, 31, 1998, pp. 395-404.
-
(1998)
Computers and Education
, vol.31
, pp. 395-404
-
-
Rowe, N.1
Schiavo, S.2
-
13
-
-
84946402157
-
Counterplanning for multi-agent plans using stochastic means-ends analysis
-
Rowe, N., and Andrade, S., Counterplanning for multi-agent plans using stochastic means-ends analysis, IASTED Artificial Intelligence and Applications Conference, Malaga, Spain, September 2002, pp. 405-410.
-
IASTED Artificial Intelligence and Applications Conference, Malaga, Spain, September 2002
, pp. 405-410
-
-
Rowe, N.1
Andrade, S.2
-
14
-
-
0004231565
-
-
Cambridge, MA: MIT Press
-
Weiss, G., (Ed.), Multiagent Systems. Cambridge, MA: MIT Press, 1999.
-
(1999)
Multiagent Systems
-
-
Weiss, G.1
-
15
-
-
0027814618
-
Principles, techniques, and ethics of stage magic and their application to human interface design
-
Tognazzini, B., Principles, techniques, and ethics of stage magic and their application to human interface design. Proc. Conference on Human Factors and Computing Systems (INTERCHI) 1993, Amsterdam, April 1993, pp. 355-362.
-
Proc. Conference on Human Factors and Computing Systems (INTERCHI) 1993, Amsterdam, April 1993
, pp. 355-362
-
-
Tognazzini, B.1
-
16
-
-
3843119704
-
Cognitive factors in deception and counterdeception
-
ed. Daniel, D. C., and Herbig, K. L., New York: Pergamon
-
Heuer, R. J., Cognitive factors in deception and counterdeception. In Strategic Military Deception, ed. Daniel, D. C., and Herbig, K. L., New York: Pergamon, 1982, pp. 31-69.
-
(1982)
Strategic Military Deception
, pp. 31-69
-
-
Heuer, R.J.1
|