-
1
-
-
0003586486
-
How to Do Things with Words
-
2nd edition, ed. Urmson, J., & Sbis, M., Oxford University Press, Oxford
-
Austin, J. L. (1975) How to Do Things with Words, 2nd edition, ed. Urmson, J., & Sbis, M., Oxford University Press, Oxford.
-
(1975)
-
-
Austin, J.L.1
-
2
-
-
0042183041
-
Cheating and Deception
-
Transaction Publishers, New Brunswick, New Jersey
-
Bell, J. B., & Whaley, B. (1991) Cheating and Deception, Transaction Publishers, New Brunswick, New Jersey.
-
(1991)
-
-
Bell, J.B.1
Whaley, B.2
-
3
-
-
0008390875
-
Hack Attacks Revealed
-
Wiley, New York
-
Chirillo, J. (2002) Hack Attacks Revealed, Wiley, New York.
-
(2002)
-
-
Chirillo, J.1
-
4
-
-
0011522539
-
Simulating cyber attacks, defenses, and consequences
-
Cohen, F., (1999) "Simulating cyber attacks, defenses, and consequences," [online] all.net/journal/ntb/simulate/ simulate.html.
-
(1999)
-
-
Cohen, F.1
-
5
-
-
0038103909
-
Leading attackers through attack graphs with deceptions
-
2000
-
Cohen, F., and Koike, D. (2003) "Leading attackers through attack graphs with deceptions," Computers and Security, Vol. 22, no. 5, pp. 402-411, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.5
, pp. 402-411
-
-
Cohen, F.1
Koike, D.2
-
6
-
-
17644424832
-
Parsing and case interpretation in TANKA
-
Nantes, France
-
Copeck, T., Delisle, S., & Szparkowicz, S. (1992). Parsing and case interpretation in TANKA. Conference on Computational Linguistics, Nantes, France, pp. 1008-1023.
-
(1992)
Conference on Computational Linguistics
, pp. 1008-1023
-
-
Copeck, T.1
Delisle, S.2
Szparkowicz, S.3
-
7
-
-
0345015442
-
Can computers deliberately deceive? A simulation tool and its application to Turing's imitation game
-
2003
-
De Rosis, F., Castelfranchi, C., Carofiglio, V., & Grassano, R. (2003) "Can computers deliberately deceive? A simulation tool and its application to Turing's imitation game," Computational Intelligence, Vol. 19, No. 3, 2003, pp. 235-263.
-
(2003)
Computational Intelligence
, vol.19
, Issue.3
, pp. 235-263
-
-
De Rosis, F.1
Castelfranchi, C.2
Carofiglio, V.3
Grassano, R.4
-
8
-
-
17644382131
-
Victory and Deceit, 2nd edition: Deception and Trickery in War
-
Writers Press Books, San Jose, California
-
Dunnigan, J. F., & Nofi, A. A. (2001) Victory and Deceit, 2nd edition: Deception and Trickery in War, Writers Press Books, San Jose, California.
-
(2001)
-
-
Dunnigan, J.F.1
Nofi, A.A.2
-
9
-
-
0002635287
-
The case for case
-
ed. Bach, E. & Harns, R., Holt, Rinehart, & Winston, New York
-
Fillmore, C. (1968) "The case for case," in Universals in Linguistic Theory, ed. Bach, E. & Harns, R., Holt, Rinehart, & Winston, New York.
-
(1968)
Universals in Linguistic Theory
-
-
Fillmore, C.1
-
10
-
-
84903855224
-
Persuasive Technology: Using Computers to Change What We Think and Do
-
Morgan Kaufman, San Francisco, CA
-
Fogg, B. (2003) Persuasive Technology: Using Computers to Change What We Think and Do, Morgan Kaufman, San Francisco, CA.
-
(2003)
-
-
Fogg, B.1
-
11
-
-
0010646470
-
Tactical deception in air-land warfare
-
June
-
Fowler, C. A., & Nesbit, R. F. (1995) "Tactical deception in air-land warfare," Journal of Electronic Defense, Vol. 18, No. 6 (June), pp. 37-44 & 76-79.
-
(1995)
Journal of Electronic Defense
, vol.18
, Issue.6
-
-
Fowler, C.A.1
Nesbit, R.F.2
-
12
-
-
33749586829
-
Employing deception in information systems to thwart adversary reconnaissance-phase activities
-
National Defense Research Institute, Rand Corp., PM-1124-NSA, November
-
Gerwehr, S., Weissler, R., Medby, J. J., Anderson, R. H., & Rothenberg, J. (2000) "Employing deception in information systems to thwart adversary reconnaissance-phase activities," Project Memorandum, National Defense Research Institute, Rand Corp., PM-1124-NSA, November.
-
(2000)
Project Memorandum
-
-
Gerwehr, S.1
Weissler, R.2
Medby, J.J.3
Anderson, R.H.4
Rothenberg, J.5
-
13
-
-
0012109964
-
Know Your Enemy
-
The Honeynet Project, Second Edition, Addison-Wesley, Boston, Massachusetts
-
The Honeynet Project (2004) Know Your Enemy, Second Edition, Addison-Wesley, Boston, Massachusetts.
-
(2004)
-
-
-
14
-
-
3843077323
-
Information Warfare: Corporate Attack and Defence in a Digital World
-
Oxford, UK: Butterworth Heinemann
-
Hutchinson, B., & Warren, M. (2001) Information Warfare: Corporate Attack and Defence in a Digital World. Oxford, UK: Butterworth Heinemann.
-
(2001)
-
-
Hutchinson, B.1
Warren, M.2
-
15
-
-
84896293845
-
Experiments with deceptive software responses to bufferbased attacks
-
West Point, New York, June
-
Julian, D., Rowe, N., & Michael, J. B. (2003) "Experiments with deceptive software responses to bufferbased attacks," IEEE-SMC Workshop on Information Assurance, West Point, New York, June, pp. 43-44.
-
(2003)
IEEE-SMC Workshop on Information Assurance
, pp. 43-44
-
-
Julian, D.1
Rowe, N.2
Michael, J.B.3
-
16
-
-
10044251518
-
Deception in War
-
The Overlook Press, New York
-
Latimer, J. (2001) Deception in War, The Overlook Press, New York.
-
(2001)
-
-
Latimer, J.1
-
17
-
-
84896282535
-
2005 Annual Security Report
-
MessageLabs
-
MessageLabs (2005) "2005 Annual Security Report," [online], www.messagelabs.com.
-
(2005)
-
-
-
18
-
-
9544229100
-
The Art of Deception
-
Cyber Age Books, New York
-
Mitnick, K. (2002) The Art of Deception, Cyber Age Books, New York.
-
(2002)
-
-
Mitnick, K.1
-
19
-
-
2942561852
-
Web of Deception: Misinformation on the Internet
-
CyberAge Books, New York
-
Mintz, A. P. (ed.) (2002) Web of Deception: Misinformation on the Internet, CyberAge Books, New York.
-
(2002)
-
-
Mintz, A.P.1
-
20
-
-
17644382508
-
How intrusion detection can improve software decoy applications
-
M.S. thesis, U.S. Naval Postgraduate School, [online]
-
Monteiro, V. (2003) "How intrusion detection can improve software decoy applications," M.S. thesis, U.S. Naval Postgraduate School, [online] www.cs.nps.navy.mil/people/faculty/rowe/oldstudents/monteiro_thesis.htm.
-
(2003)
-
-
Monteiro, V.1
-
21
-
-
0003742152
-
The Varnished Truth: Truth Telling and Deceiving in Ordinary Life
-
University of Chicago Press, Chicago
-
Nyberg, D. (1993) The Varnished Truth: Truth Telling and Deceiving in Ordinary Life, University of Chicago Press, Chicago.
-
(1993)
-
-
Nyberg, D.1
-
22
-
-
0003914957
-
Practical Intrusion Detection Handbook
-
Prentice-Hall PTR, Upper Saddle River, NJ
-
Proctor, P. E. (2001) Practical Intrusion Detection Handbook, Prentice-Hall PTR, Upper Saddle River, NJ.
-
(2001)
-
-
Proctor, P.E.1
-
23
-
-
17644370860
-
Counterplanning deceptions to foil cyber-attack plans
-
West Point, NY, June
-
Rowe, N. C. (2003) "Counterplanning deceptions to foil cyber-attack plans," IEEE-SMC Workshop on Information Assurance, West Point, NY, June, pp. 203-211.
-
(2003)
IEEE-SMC Workshop on Information Assurance
, pp. 203-211
-
-
Rowe, N.C.1
-
24
-
-
21644439165
-
Designing good deceptions in defense of information systems
-
Tucson, AZ, December
-
Rowe, N. (2004) "Designing good deceptions in defense of information systems," Computer Security Applications Conference, Tucson, AZ, December, pp. 418-427.
-
(2004)
Computer Security Applications Conference
, pp. 418-427
-
-
Rowe, N.1
-
25
-
-
33749616035
-
Measuring the effectiveness of honeypot counter-counterdeception
-
Hawaii International Conference on Systems Sciences, Poipu, HI, January
-
Rowe, N. (2006) "Measuring the effectiveness of honeypot counter-counterdeception," Hawaii International Conference on Systems Sciences, Poipu, HI, January.
-
(2006)
-
-
Rowe, N.1
-
26
-
-
21644437899
-
Two taxonomies of deception for attacks on information systems
-
July
-
Rowe, N., & Rothstein, H. (2004) "Two taxonomies of deception for attacks on information systems," Journal of Information Warfare, 3 (2), July, pp. 27-39.
-
(2004)
Journal of Information Warfare
, vol.3
, Issue.2
, pp. 27-39
-
-
Rowe, N.1
Rothstein, H.2
-
27
-
-
0004058336
-
Excuses: Masquerades in Search of Grace
-
Wiley, New York
-
Snyder, C. R., Higgins, R. L., and Stucky, R. J. (1983) Excuses: Masquerades in Search of Grace, Wiley, New York.
-
(1983)
-
-
Snyder, C.R.1
Higgins, R.L.2
Stucky, R.J.3
|