|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
148 | Amrish Vyas, Lina Zhou |
On Detecting Deception in Agent Societies. |
IAT |
2005 |
DBLP DOI BibTeX RDF |
Multi-Agent Systems, Agents, Deception, Deception Detection, Agent Societies |
147 | Zhaohao Sun, Gavin R. Finnie |
Experience Based Reasoning for Recognising Fraud and Deception. |
HIS |
2004 |
DBLP DOI BibTeX RDF |
|
123 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
110 | Patti Tilley, Joey F. George, Kent Marett |
Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
99 | Catalina L. Toma, Jeffrey T. Hancock |
Reading between the lines: linguistic cues to deception in online dating profiles. |
CSCW |
2010 |
DBLP DOI BibTeX RDF |
linguistic cues to deception, social networking sites, deception, online dating |
99 | Gregory Johnson Jr., Eugene Santos Jr. |
Detecting Deception in Intelligent Systems I: Activation of Deception Detection Tactics. |
Canadian AI |
2004 |
DBLP DOI BibTeX RDF |
|
98 | Lina Zhou, Yu-wei Sung |
Cues to Deception in Online Chinese Groups. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
93 | Brian Hernacki, Jeremy Bennett, Thomas Lofgren |
Symantec Deception Server Experience with a Commercial Deception System. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
ManTrap, Honeypot, Deception |
92 | Valeria Carofiglio, Fiorella de Rosis, Cristiano Castelfranchi |
Ascribing and Weighting Beliefs in Deceptive Information Exchanges. |
User Modeling |
2001 |
DBLP DOI BibTeX RDF |
belief ascription, dialog simulation, deception, belief networks |
86 | Lina Zhou, Yongmei Shi, Dongsong Zhang |
A Statistical Language Modeling Approach to Online Deception Detection. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Amit V. Deokar, Therani Madhusudan |
Developing Group Decision Support Systems for Deception Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
86 | Gabriel A. Giordano, Joey F. George |
Task Complexity and Deception Detection in a Collaborative Group Setting. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
86 | Christian Blum 0001, Marco Dorigo |
Deception in Ant Colony Optimization. |
ANTS Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Therani Madhusudan |
On a Text-Processing Approach to Facilitating Autonomous Deception Detection. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
86 | Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell |
A Longitudinal Analysis of Language Behavior of Deception in E-mail. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
86 | Jinwei Cao, Janna M. Crews, Ming Lin 0001, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
80 | Darcy Warkentin, Michael Woodworth, Jeffrey T. Hancock, Nicole Cormier |
Warrants and deception in computer mediated communication. |
CSCW |
2010 |
DBLP DOI BibTeX RDF |
warrant, deception |
80 | Isabella Poggi, Radoslaw Niewiadomski, Catherine Pelachaud |
Facial Deception in Humans and ECAs. |
ZiF Workshop |
2006 |
DBLP DOI BibTeX RDF |
deception, politeness, social influence, ECA |
80 | Vicentiu Neagoe, Matt Bishop |
Inconsistency in deception for defense. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
security, operating systems, inconsistency, deception |
74 | Tiantian Qin, Judee K. Burgoon, J. P. Blair, Jay F. Nunamaker Jr. |
Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Tiantian Qin, Judee K. Burgoon |
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
74 | S. Gupta, David B. Skillicorn |
Improving a textual deception detection model. |
CASCON |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr. |
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior. |
IEEE Intell. Syst. |
2005 |
DBLP DOI BibTeX RDF |
decision support, video analysis, feature representation, face and gesture recognition |
74 | Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Adkins, John Kruse, Judee K. Burgoon, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr. |
HMM-Based Deception Recognition from Visual Cues. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Lina Zhou, Azene Zenebe |
Modeling and Handling Uncertainty in Deception Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Lina Zhou, Simon Lutterbie |
Deception Across Cultures: Bottom-Up and Top-Down Approaches. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Lina Zhou, Dongsong Zhang |
Can Online Behavior Unveil Deceivers? - An Exploratory Investigation of Deception in Instant Messaging. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Joey F. George, Kent Marett |
Inhibiting Deception and Its Detection. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Zhanshan (Sam) Ma |
Towards an Extended Evolutionary Game Theory with Survival Analysis and Agreement Algorithms for Modeling Uncertainty, Vulnerability, and Deception. |
AICI |
2009 |
DBLP DOI BibTeX RDF |
Extended Evolutionary Game Theory, Agreement Algorithms, Frailty, Dynamic Hybrid Fault Models, UUUR (Uncertain and latent and Unobservable or Unobserved Risks), Strategic Information Warfare, Security, Reliability, Survivability, Deception, Evolutionary Game Theory, Survival Analysis |
68 | Pilib Ó Broin, Colm O'Riordan |
An evolutionary approach to deception in multi-agent systems. |
Artif. Intell. Rev. |
2007 |
DBLP DOI BibTeX RDF |
Multi-agent systems, Evolutionary computation, Deception |
61 | Ayron Little, David B. Skillicorn |
Detecting deception in testimony. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
61 | G. A. Wang, H. Chen, J. J. Xu, H. Atabakhsh |
Automatically detecting criminal identity deception: an adaptive detection algorithm. |
IEEE Trans. Syst. Man Cybern. Part A |
2006 |
DBLP DOI BibTeX RDF |
|
61 | James D. Jones |
Using Logic Programming to Detect Deception on the Basis of Actions. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Richard O. Day, Gary B. Lamont |
Extended Multi-objective fast messy Genetic Algorithm Solving Deception Problems. |
EMO |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Joey F. George, Kent Marett, Judee K. Burgoon, Janna M. Crews, Jinwei Cao, Ming Lin, David P. Biros |
Training to Detect Deception: An Experimental Investigation. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Training Professionals to Detect Deception. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Cristiano Castelfranchi, Yao-Hua Tan |
The Role of Trust and Deception in Virtual Societies. |
HICSS |
2001 |
DBLP DOI BibTeX RDF |
|
61 | James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson |
A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Greg Briskin, Dan Fayette, Nick Evancich, Vahid Rajabian-Schwart, Anthony Macera, Jason H. Li |
Design Considerations for Building Cyber Deception Systems. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Mohammed H. Almeshekah, Eugene H. Spafford |
Cyber Security Deception. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little |
Cyber-Deception and Attribution in Capture-the-Flag Exercises. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Ehab Al-Shaer, Syed Fida Gillani |
Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Al Underbrink |
Effective Cyber Deception. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
56 | Brent Auernheimer, Marie Iding, Martha E. Crosby |
Implications of User Anxiety in the Evaluation of Deception in Web Sites. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
Control, Assistive Technology, Web Sites, Deception, Anxiety |
56 | Junfeng Tian, Ning Li |
A New Proactive Defense Model Based on Intrusion Deception and Traceback. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Intrusion deception, Trap environment, Honeypot, Traceback |
56 | Jeffrey T. Hancock, Jennifer Thom-Santelli, Thompson Ritchie |
Deception and design: the impact of communication technology on lying behavior. |
CHI |
2004 |
DBLP DOI BibTeX RDF |
communication, trust, CMC, deception, media, lying |
56 | Bin Yu 0006, Munindar P. Singh |
Detecting deception in reputation management. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
weighted majority algorithm, reputation, deception, belief functions, trust networks |
55 | Valeria Carofiglio, Cristiano Castelfranchi, Fiorella de Rosis, Roberto Grassano |
An Interactive System for Generating Arguments in Deceptive Communication. |
AI*IA |
2001 |
DBLP DOI BibTeX RDF |
belief ascription, dialog simulation, deception, belief networks |
49 | Lina Zhou, Azene Zenebe |
Representation and Reasoning Under Uncertainty in Deception Detection: A Neuro-Fuzzy Approach. |
IEEE Trans. Fuzzy Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Fan Xia, Hong Wang 0004, Junxian Huang |
Deception Detection Via Blob Motion Pattern Analysis. |
ACII |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Shuliang Zhao, Guorui Jiang, Tiyun Huang, Xiaoyan Yang |
The Deception Detection and Restraint in Multi-agent System. |
ICTAI |
2005 |
DBLP DOI BibTeX RDF |
|
49 | David P. Biros, Michael C. Hass, Karl Wiers, Douglas P. Twitchell, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Tiantian Qin, Judee K. Burgoon |
An Empirical Study on Dynamic Effects on Deception Detection. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Judee K. Burgoon, Gates Matthew Stoner, Joseph A. Bonito, Norah E. Dunbar |
Trust and Deception in Mediated Communication. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Douglas P. Twitchell, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Christian Blum 0001, Marco Dorigo |
Search bias in ant colony optimization: on the role of competition-balanced systems. |
IEEE Trans. Evol. Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
46 | George Cybenko, Gabriel Stocco, Patrick Sweeney |
Quantifying Covertness in Deceptive Cyber Operations. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Zhuo Lu, Cliff Wang, Mingkui Wei |
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini |
Anonymity in an Electronic Society: A Survey. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Frederico Araujo, Kevin W. Hamlen |
Embedded Honeypotting. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Jana Shakarian, Andrew T. Gunn, Paulo Shakarian |
Exploring Malicious Hacker Forums. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Massimiliano Albanese, Ermanno Battista, Sushil Jajodia |
Deceiving Attackers by Creating a Virtual Attack Surface. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Frank J. Stech, Kristin E. Heckman, Blake E. Strom |
Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense. |
Cyber Deception |
2016 |
DBLP DOI BibTeX RDF |
|
44 | William Steptoe, Anthony Steed, Aitor Rovira, John Rae |
Lie tracking: social presence, truth and deception in avatar-mediated telecommunication. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
avatar-mediated communication, trust, virtual environments, eye tracking, social presence, deception, video-mediated communication |
44 | Andrea K. Webb, Douglas J. Hacker, Dahvyn Osher, Anne E. Cook, Dan J. Woltz, Sean Kristjansson, John C. Kircher |
Eye Movements and Pupil Size Reveal Deception in Computer Administered Questionnaires. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
Oculomotor measures, deception, pupil size |
44 | Jeffrey T. Hancock, Jeremy P. Birnholtz, Natalya N. Bazarova, Jamie Guillory, Josh Perlin, Barrett Amos |
Butler lies: awareness, deception and design. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
interpersonal awareness, computer-mediated communication, instant messaging, deception |
44 | Sandip K. Basu, A. K. Bhatia |
Mitigating Deception in Genetic Search Through Suitable Coding. |
ICONIP (3) |
2006 |
DBLP DOI BibTeX RDF |
Neighbourhood search, Genetic algorithm, Deception |
44 | Derrick Ward, Henry Hexmoor |
Towards deception in agents. |
AAMAS |
2003 |
DBLP DOI BibTeX RDF |
trust, autonomy, deception |
44 | Erin Bradner, Gloria Mark |
Why distance matters: effects on cooperation, persuasion and deception. |
CSCW |
2002 |
DBLP DOI BibTeX RDF |
CSCW, empirical study, video, cooperation, instant messaging, deception, distance collaboration |
43 | Jeremy P. Birnholtz, Jamie Guillory, Jeffrey T. Hancock, Natalya N. Bazarova |
"on my way": deceptive texting and interpersonal awareness narratives. |
CSCW |
2010 |
DBLP DOI BibTeX RDF |
interpersonal awareness, computer-mediated communication, deception, text messaging, sms |
43 | Kyung Hyan Yoo, Ulrike Gretzel |
Comparison of Deceptive and Truthful Travel Reviews. |
ENTER |
2009 |
DBLP DOI BibTeX RDF |
hotel reviews, false, detection, deception, truthful |
43 | Jonathan Y. Ito, David V. Pynadath, Stacy C. Marsella |
Self-deceptive decision making: normative and descriptive insights. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
self-deception, wishful thinking, multi-agent systems, decision theory |
43 | Michael Voong, Russell Beale |
Representing location in location-based social awareness systems. |
BCS HCI (2) |
2008 |
DBLP DOI BibTeX RDF |
mobile, location, design guidelines, deception, social awareness, connectedness |
43 | Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs |
Secrets and lies in computer-mediated interaction: theory, methods and design. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, design, deception, secrecy |
43 | Janet Rothwell, Zuhair Bandar, James O'Shea, David McLean 0001 |
Charting the behavioural state of a person using a backpropagation neural network. |
Neural Comput. Appl. |
2007 |
DBLP DOI BibTeX RDF |
Nonverbal, Backpropagation, Deception, Behaviour, Multichannels, Chart |
43 | Jeffrey T. Hancock, Catalina L. Toma, Nicole B. Ellison |
The truth about lying in online dating profiles. |
CHI |
2007 |
DBLP DOI BibTeX RDF |
computer-mediated communication, deception, self-presentation, online dating, lying |
38 | Frank J. Stech, Kristin E. Heckman, Phil Hilliard, Janice Redington Ballo |
Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space. |
PsychNology J. |
2011 |
DBLP BibTeX RDF |
|
37 | Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen |
Stealthy deception attacks on water SCADA systems. |
HSCC |
2010 |
DBLP DOI BibTeX RDF |
secure control systems, switching pdes, water mangement |
37 | Bin Xin 0002, Jie Chen 0003, Feng Pan 0003 |
Problem difficulty analysis for particle swarm optimization: deception and modality. |
GEC Summit |
2009 |
DBLP DOI BibTeX RDF |
particle swarm optimization, global optimization, problem hardness |
37 | Ephraim Nissan |
Epistemic formulae, argument structures, and a narrative on identity and deception: a formal representation from the AJIT subproject within AURANGZEB. |
Ann. Math. Artif. Intell. |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 68T30, 68T50, 00B15 |
37 | Jonathan Y. Ito, David V. Pynadath, Stacy Marsella |
Modeling Self-deception within a Decision-Theoretic Framework. |
IVA |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse |
Blob Analysis of the Head and Hands: A Method for Deception Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Judee K. Burgoon, J. P. Blair, Renee E. Strom |
Heuristics and Modalities in Determining Truth Versus Deception. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger |
An Approach for Intent Identification by Building on Deception Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
37 | David B. Christian, Robert Michael Young |
Strategic Deception in Agents. |
AAMAS |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Joey F. George, John R. Carlson |
Media Selection for Deceptive Communication. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Joe Marshall, Steve Benford, Tony P. Pridmore |
Deception and magic in collaborative interaction. |
CHI |
2010 |
DBLP DOI BibTeX RDF |
misdirection, spectator interface, performance, interaction, ambiguity, trajectories, deception, magic, feedthrough |
31 | Hu Zhang 0003, Shan-de Wei, Hongye Tan, Jia-heng Zheng |
Deception Detection Based on SVM for Chinese Text in CMC. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Chinese Text, SVM, CMC, Deception Detection |
31 | Debora Field, Allan Ramsay |
Sarcasm, Deception, and Stating the Obvious: Planning Dialogue without Speech Acts. |
Artif. Intell. Rev. |
2004 |
DBLP DOI BibTeX RDF |
conversational record, deception, speech acts, AI planning, implicature |
31 | Zhanshan (Sam) Ma, Axel W. Krings, Chih-Cheng Hung |
The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
Handicap Principle, Animal Communication Network, Signal Honesty, Extended Evolutionary Game Theory, Pervasive and Resilient Computing, Semantic Web, Social Networking, Trust, Deception, Eavesdropping |
31 | Wanita Sherchan, Seng Wai Loke, Shonali Krishnaswamy |
Explanation-aware service selection: rationale and reputation. |
Serv. Oriented Comput. Appl. |
2008 |
DBLP DOI BibTeX RDF |
Collusion detection, Web services, Reputation, Recommendation, Explanation, Rationale, Deception detection |
31 | Matthias Rehm, Elisabeth André |
Catch me if you can: exploring lying agents in social settings. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
non-verbal behavior, embodied conversational agents, engagement, deception |
31 | Vinod Yegneswaran, Paul Barford, David Plonka |
On the Design and Use of Internet Sinks for Network Abuse Monitoring. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
Deception Systems, Intrusion Detection, Honeypots |
26 | Kang Chen, Zheng Lian, Haiyang Sun, Bin Liu, Jianhua Tao 0001 |
Can Deception Detection Go Deeper? Dataset, Evaluation, and Benchmark for Deception Reasoning. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Aswathy Velutharambath, Roman Klinger |
UNIDECOR: A Unified Deception Corpus for Cross-Corpus Deception Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Aswathy Velutharambath, Roman Klinger |
UNIDECOR: A Unified Deception Corpus for Cross-Corpus Deception Detection. |
WASSA@ACL |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Wasiq Khan, Keeley A. Crockett, James O'Shea, Abir Hussain, Bilal Muhammed Khan |
Deception in the eyes of deceiver: A computer vision and machine learning based automated deception detection. |
Expert Syst. Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Kelly Shortridge, Ryan Petrich |
Lamboozling Attackers: A New Generation of Deception: Software engineering teams can exploit attackers' human nature by building deception environments. |
ACM Queue |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Md. Mazharul Islam 0001, Ehab Al-Shaer |
Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception. |
SecDev |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1875 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|