|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 307 occurrences of 218 keywords
|
|
|
Results
Found 1875 publication records. Showing 1875 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
148 | Amrish Vyas, Lina Zhou |
On Detecting Deception in Agent Societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Compiegne, France, September 19-22, 2005, pp. 491-494, 2005, IEEE Computer Society, 0-7695-2416-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Multi-Agent Systems, Agents, Deception, Deception Detection, Agent Societies |
147 | Zhaohao Sun, Gavin R. Finnie |
Experience Based Reasoning for Recognising Fraud and Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS ![In: 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 5-8 December 2004, Kitakyushu, Japan, pp. 80-85, 2004, IEEE Computer Society, 0-7695-2291-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
123 | Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval |
Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (16) ![In: Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 5th International Conference, FAC 2009 Held as Part of HCI International 2009 San Diego, CA, USA, July 19-24, 2009, Proceedings, pp. 138-147, 2009, Springer, 978-3-642-02811-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks |
110 | Patti Tilley, Joey F. George, Kent Marett |
Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
99 | Catalina L. Toma, Jeffrey T. Hancock |
Reading between the lines: linguistic cues to deception in online dating profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work, CSCW 2010, Savannah, Georgia, USA, February 6-10, 2010, pp. 5-8, 2010, ACM, 978-1-60558-795-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
linguistic cues to deception, social networking sites, deception, online dating |
99 | Gregory Johnson Jr., Eugene Santos Jr. |
Detecting Deception in Intelligent Systems I: Activation of Deception Detection Tactics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Canadian AI ![In: Advances in Artificial Intelligence, 17th Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2004, London, Ontario, Canada, May 17-19, 2004, Proceedings, pp. 339-354, 2004, Springer, 3-540-22004-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
98 | Lina Zhou, Yu-wei Sung |
Cues to Deception in Online Chinese Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 146, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
93 | Brian Hernacki, Jeremy Bennett, Thomas Lofgren |
Symantec Deception Server Experience with a Commercial Deception System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 188-202, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ManTrap, Honeypot, Deception |
92 | Valeria Carofiglio, Fiorella de Rosis, Cristiano Castelfranchi |
Ascribing and Weighting Beliefs in Deceptive Information Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Modeling ![In: User Modeling 2001, 8th International Conference, UM 2001, Sonthofen, Germany, July 13-17, 2001, Proceedings, pp. 222-224, 2001, Springer, 3-540-42325-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
belief ascription, dialog simulation, deception, belief networks |
86 | Lina Zhou, Yongmei Shi, Dongsong Zhang |
A Statistical Language Modeling Approach to Online Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(8), pp. 1077-1081, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Amit V. Deokar, Therani Madhusudan |
Developing Group Decision Support Systems for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
86 | Gabriel A. Giordano, Joey F. George |
Task Complexity and Deception Detection in a Collaborative Group Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
86 | Christian Blum 0001, Marco Dorigo |
Deception in Ant Colony Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS Workshop ![In: Ant Colony Optimization and Swarm Intelligence, 4th International Workshop, ANTS 2004, Brussels, Belgium, September 5 - 8, 2004, Proceedings, pp. 118-129, 2004, Springer, 3-540-22672-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
86 | Therani Madhusudan |
On a Text-Processing Approach to Facilitating Autonomous Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 43, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
86 | Lina Zhou, Judee K. Burgoon, Douglas P. Twitchell |
A Longitudinal Analysis of Language Behavior of Deception in E-mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 102-110, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
86 | Jinwei Cao, Janna M. Crews, Ming Lin 0001, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Designing Agent99 Trainer: A Learner-Centered, Web-Based Training System for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 358-365, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
80 | Darcy Warkentin, Michael Woodworth, Jeffrey T. Hancock, Nicole Cormier |
Warrants and deception in computer mediated communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work, CSCW 2010, Savannah, Georgia, USA, February 6-10, 2010, pp. 9-12, 2010, ACM, 978-1-60558-795-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
warrant, deception |
80 | Isabella Poggi, Radoslaw Niewiadomski, Catherine Pelachaud |
Facial Deception in Humans and ECAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ZiF Workshop ![In: Modeling Communication with Robots and Virtual Humans, Second ZiF Research Group International Workshop on Embodied Communication in Humans and Machines, Bielefeld, Germany, April 5-8, 2006, Revised Selected Papers, pp. 198-221, 2006, Springer, 978-3-540-79036-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
deception, politeness, social influence, ECA |
80 | Vicentiu Neagoe, Matt Bishop |
Inconsistency in deception for defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2006, Schloss Dagstuhl, Germany, September 19-22, 2006, pp. 31-38, 2006, ACM, 978-1-59593-923-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, operating systems, inconsistency, deception |
74 | Tiantian Qin, Judee K. Burgoon, J. P. Blair, Jay F. Nunamaker Jr. |
Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Tiantian Qin, Judee K. Burgoon |
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings, pp. 152-159, 2007, IEEE, 1-4244-1329-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | S. Gupta, David B. Skillicorn |
Improving a textual deception detection model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2006 conference of the Centre for Advanced Studies on Collaborative Research, October 16-19, 2006, Toronto, Ontario, Canada, pp. 345-348, 2006, IBM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Thomas O. Meservy, Matthew L. Jensen, John Kruse, Douglas P. Twitchell, Judee K. Burgoon, Dimitris N. Metaxas, Jay F. Nunamaker Jr. |
Deception Detection through Automatic, Unobtrusive Analysis of Nonverbal Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 20(5), pp. 36-43, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
decision support, video analysis, feature representation, face and gesture recognition |
74 | Gabriel Tsechpenakis, Dimitris N. Metaxas, Mark Adkins, John Kruse, Judee K. Burgoon, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr. |
HMM-Based Deception Recognition from Visual Cues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 824-827, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Lina Zhou, Azene Zenebe |
Modeling and Handling Uncertainty in Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Lina Zhou, Simon Lutterbie |
Deception Across Cultures: Bottom-Up and Top-Down Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 465-470, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Lina Zhou, Dongsong Zhang |
Can Online Behavior Unveil Deceivers? - An Exploratory Investigation of Deception in Instant Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
74 | Joey F. George, Kent Marett |
Inhibiting Deception and Its Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Zhanshan (Sam) Ma |
Towards an Extended Evolutionary Game Theory with Survival Analysis and Agreement Algorithms for Modeling Uncertainty, Vulnerability, and Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICI ![In: Artificial Intelligence and Computational Intelligence, International Conference, AICI 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 608-618, 2009, Springer, 978-3-642-05252-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Extended Evolutionary Game Theory, Agreement Algorithms, Frailty, Dynamic Hybrid Fault Models, UUUR (Uncertain and latent and Unobservable or Unobserved Risks), Strategic Information Warfare, Security, Reliability, Survivability, Deception, Evolutionary Game Theory, Survival Analysis |
68 | Pilib Ó Broin, Colm O'Riordan |
An evolutionary approach to deception in multi-agent systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 27(4), pp. 257-271, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multi-agent systems, Evolutionary computation, Deception |
61 | Ayron Little, David B. Skillicorn |
Detecting deception in testimony. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 13-18, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | G. A. Wang, H. Chen, J. J. Xu, H. Atabakhsh |
Automatically detecting criminal identity deception: an adaptive detection algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 36(5), pp. 988-999, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | James D. Jones |
Using Logic Programming to Detect Deception on the Basis of Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 662-663, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Richard O. Day, Gary B. Lamont |
Extended Multi-objective fast messy Genetic Algorithm Solving Deception Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMO ![In: Evolutionary Multi-Criterion Optimization, Third International Conference, EMO 2005, Guanajuato, Mexico, March 9-11, 2005, Proceedings, pp. 296-310, 2005, Springer, 3-540-24983-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Douglas P. Twitchell, Nicole Forsgren, Karl Wiers, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Detecting Deception in Synchronous Computer-Mediated Communication Using Speech Act Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 471-478, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Joey F. George, Kent Marett, Judee K. Burgoon, Janna M. Crews, Jinwei Cao, Ming Lin, David P. Biros |
Training to Detect Deception: An Experimental Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 37th Hawaii International Conference on System Sciences (HICSS-37 2004), CD-ROM / Abstracts Proceedings, 5-8 January 2004, Big Island, HI, USA, 2004, IEEE Computer Society, 0-7695-2056-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Training Professionals to Detect Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, pp. 366-370, 2003, Springer, 3-540-40189-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
61 | Cristiano Castelfranchi, Yao-Hua Tan |
The Role of Trust and Deception in Virtual Societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 34th Annual Hawaii International Conference on System Sciences (HICSS-34), January 3-6, 2001, Maui, Hawaii, USA, 2001, IEEE Computer Society, 0-7695-0981-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
61 | James D. Jones, Hemant Joshi, Umit Topaloglu, Eric Nelson |
A Child's Story to Illustrate Automated Reasoning Systems Using Opportunity and History. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 668-670, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Greg Briskin, Dan Fayette, Nick Evancich, Vahid Rajabian-Schwart, Anthony Macera, Jason H. Li |
Design Considerations for Building Cyber Deception Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 71-97, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Mohammed H. Almeshekah, Eugene H. Spafford |
Cyber Security Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 25-52, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little |
Cyber-Deception and Attribution in Capture-the-Flag Exercises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 151-167, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Ehab Al-Shaer, Syed Fida Gillani |
Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 235-259, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
58 | Al Underbrink |
Effective Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 117-149, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
56 | Brent Auernheimer, Marie Iding, Martha E. Crosby |
Implications of User Anxiety in the Evaluation of Deception in Web Sites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (16) ![In: Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 5th International Conference, FAC 2009 Held as Part of HCI International 2009 San Diego, CA, USA, July 19-24, 2009, Proceedings, pp. 114-119, 2009, Springer, 978-3-642-02811-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Control, Assistive Technology, Web Sites, Deception, Anxiety |
56 | Junfeng Tian, Ning Li |
A New Proactive Defense Model Based on Intrusion Deception and Traceback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 497-506, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion deception, Trap environment, Honeypot, Traceback |
56 | Jeffrey T. Hancock, Jennifer Thom-Santelli, Thompson Ritchie |
Deception and design: the impact of communication technology on lying behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 129-134, 2004, ACM, 1-58113-702-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
communication, trust, CMC, deception, media, lying |
56 | Bin Yu 0006, Munindar P. Singh |
Detecting deception in reputation management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 73-80, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
weighted majority algorithm, reputation, deception, belief functions, trust networks |
55 | Valeria Carofiglio, Cristiano Castelfranchi, Fiorella de Rosis, Roberto Grassano |
An Interactive System for Generating Arguments in Deceptive Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI*IA ![In: AI*IA 2001: Advances in Artificial Intelligence, 7th Congress of the Italian Association for Artificial Intelligence, Bari, Italy, September 25-28, 2001, Proceedings, pp. 255-266, 2001, Springer, 3-540-42601-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
belief ascription, dialog simulation, deception, belief networks |
49 | Lina Zhou, Azene Zenebe |
Representation and Reasoning Under Uncertainty in Deception Detection: A Neuro-Fuzzy Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 16(2), pp. 442-454, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Fan Xia, Hong Wang 0004, Junxian Huang |
Deception Detection Via Blob Motion Pattern Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACII ![In: Affective Computing and Intelligent Interaction, Second International Conference, ACII 2007, Lisbon, Portugal, September 12-14, 2007, Proceedings, pp. 727-728, 2007, Springer, 978-3-540-74888-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Shuliang Zhao, Guorui Jiang, Tiyun Huang, Xiaoyan Yang |
The Deception Detection and Restraint in Multi-agent System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2005), 14-16 November 2005, Hong Kong, China, pp. 44-48, 2005, IEEE Computer Society, 0-7695-2488-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | David P. Biros, Michael C. Hass, Karl Wiers, Douglas P. Twitchell, Mark Adkins, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Task Performance Under Deceptive Conditions: Using Military Scenarios in Deception Detection Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Tiantian Qin, Judee K. Burgoon |
An Empirical Study on Dynamic Effects on Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 597-599, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Judee K. Burgoon, Gates Matthew Stoner, Joseph A. Bonito, Norah E. Dunbar |
Trust and Deception in Mediated Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 44, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Douglas P. Twitchell, David P. Biros, Mark Adkins, Nicole Forsgren, Judee K. Burgoon, Jay F. Nunamaker Jr. |
Automated Determination of the Veracity of Interview Statements from People of Interest to an Operational Security Force. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Christian Blum 0001, Marco Dorigo |
Search bias in ant colony optimization: on the role of competition-balanced systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Evol. Comput. ![In: IEEE Trans. Evol. Comput. 9(2), pp. 159-174, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | George Cybenko, Gabriel Stocco, Patrick Sweeney |
Quantifying Covertness in Deceptive Cyber Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 53-69, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Zhuo Lu, Cliff Wang, Mingkui Wei |
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 99-116, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Mauro Conti, Fabio De Gaspari, Luigi Vincenzo Mancini |
Anonymity in an Electronic Society: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 285-314, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Frederico Araujo, Kevin W. Hamlen |
Embedded Honeypotting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 203-233, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Jana Shakarian, Andrew T. Gunn, Paulo Shakarian |
Exploring Malicious Hacker Forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 261-284, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Massimiliano Albanese, Ermanno Battista, Sushil Jajodia |
Deceiving Attackers by Creating a Virtual Attack Surface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 169-201, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Frank J. Stech, Kristin E. Heckman, Blake E. Strom |
Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyber Deception ![In: Cyber Deception, Building the Scientific Foundation, pp. 1-24, 2016, Springer, 978-3-319-32697-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
44 | William Steptoe, Anthony Steed, Aitor Rovira, John Rae |
Lie tracking: social presence, truth and deception in avatar-mediated telecommunication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1039-1048, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
avatar-mediated communication, trust, virtual environments, eye tracking, social presence, deception, video-mediated communication |
44 | Andrea K. Webb, Douglas J. Hacker, Dahvyn Osher, Anne E. Cook, Dan J. Woltz, Sean Kristjansson, John C. Kircher |
Eye Movements and Pupil Size Reveal Deception in Computer Administered Questionnaires. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (16) ![In: Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience, 5th International Conference, FAC 2009 Held as Part of HCI International 2009 San Diego, CA, USA, July 19-24, 2009, Proceedings, pp. 553-562, 2009, Springer, 978-3-642-02811-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Oculomotor measures, deception, pupil size |
44 | Jeffrey T. Hancock, Jeremy P. Birnholtz, Natalya N. Bazarova, Jamie Guillory, Josh Perlin, Barrett Amos |
Butler lies: awareness, deception and design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 517-526, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
interpersonal awareness, computer-mediated communication, instant messaging, deception |
44 | Sandip K. Basu, A. K. Bhatia |
Mitigating Deception in Genetic Search Through Suitable Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (3) ![In: Neural Information Processing, 13th International Conference, ICONIP 2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part III, pp. 946-953, 2006, Springer, 3-540-46484-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Neighbourhood search, Genetic algorithm, Deception |
44 | Derrick Ward, Henry Hexmoor |
Towards deception in agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 1154-1155, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
trust, autonomy, deception |
44 | Erin Bradner, Gloria Mark |
Why distance matters: effects on cooperation, persuasion and deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: CSCW 2002, Proceeding on the ACM 2002 Conference on Computer Supported Cooperative Work, New Orleans, Louisiana, USA, November 16-20, 2002, pp. 226-235, 2002, ACM, 1-58113-560-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
CSCW, empirical study, video, cooperation, instant messaging, deception, distance collaboration |
43 | Jeremy P. Birnholtz, Jamie Guillory, Jeffrey T. Hancock, Natalya N. Bazarova |
"on my way": deceptive texting and interpersonal awareness narratives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work, CSCW 2010, Savannah, Georgia, USA, February 6-10, 2010, pp. 1-4, 2010, ACM, 978-1-60558-795-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
interpersonal awareness, computer-mediated communication, deception, text messaging, sms |
43 | Kyung Hyan Yoo, Ulrike Gretzel |
Comparison of Deceptive and Truthful Travel Reviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ENTER ![In: Information and Communication Technologies in Tourism, ENTER 2009, Proceedings of the International Conference in Amsterdam, The Netherlands, 2009, pp. 37-47, 2009, Springer, 978-3-211-93970-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hotel reviews, false, detection, deception, truthful |
43 | Jonathan Y. Ito, David V. Pynadath, Stacy C. Marsella |
Self-deceptive decision making: normative and descriptive insights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1113-1120, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
self-deception, wishful thinking, multi-agent systems, decision theory |
43 | Michael Voong, Russell Beale |
Representing location in location-based social awareness systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (2) ![In: Proceedings of the 22nd British HCI Group Annual Conference on HCI 2008: People and Computers XXII: Culture, Creativity, Interaction - Volume 2, BCS HCI 2008, Liverpool, United Kingdom, 1-5 September 2008, pp. 139-142, 2008, BCS, 978-1-906124-06-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile, location, design guidelines, deception, social awareness, connectedness |
43 | Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs |
Secrets and lies in computer-mediated interaction: theory, methods and design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, Florence, Italy, April 5-10, 2008, pp. 3993-3996, 2008, ACM, 978-1-60558-012-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, design, deception, secrecy |
43 | Janet Rothwell, Zuhair Bandar, James O'Shea, David McLean 0001 |
Charting the behavioural state of a person using a backpropagation neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 16(4-5), pp. 327-339, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Nonverbal, Backpropagation, Deception, Behaviour, Multichannels, Chart |
43 | Jeffrey T. Hancock, Catalina L. Toma, Nicole B. Ellison |
The truth about lying in online dating profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2007 Conference on Human Factors in Computing Systems, CHI 2007, San Jose, California, USA, April 28 - May 3, 2007, pp. 449-452, 2007, ACM, 978-1-59593-593-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computer-mediated communication, deception, self-presentation, online dating, lying |
38 | Frank J. Stech, Kristin E. Heckman, Phil Hilliard, Janice Redington Ballo |
Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PsychNology J. ![In: PsychNology J. 9(2), pp. 79-122, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
37 | Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen |
Stealthy deception attacks on water SCADA systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HSCC ![In: Proceedings of the 13th ACM International Conference on Hybrid Systems: Computation and Control, HSCC 2010, Stockholm, Sweden, April 12-15, 2010, pp. 161-170, 2010, ACM, 978-1-60558-955-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
secure control systems, switching pdes, water mangement |
37 | Bin Xin 0002, Jie Chen 0003, Feng Pan 0003 |
Problem difficulty analysis for particle swarm optimization: deception and modality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GEC Summit ![In: Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, GEC Summit 2009, Shanghai, China, June 12-14, 2009, pp. 623-630, 2009, ACM, 978-1-60558-326-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
particle swarm optimization, global optimization, problem hardness |
37 | Ephraim Nissan |
Epistemic formulae, argument structures, and a narrative on identity and deception: a formal representation from the AJIT subproject within AURANGZEB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Math. Artif. Intell. ![In: Ann. Math. Artif. Intell. 54(4), pp. 293-362, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 68T30, 68T50, 00B15 |
37 | Jonathan Y. Ito, David V. Pynadath, Stacy Marsella |
Modeling Self-deception within a Decision-Theoretic Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Intelligent Virtual Agents, 8th International Conference, IVA 2008, Tokyo, Japan, September 1-3, 2008. Proceedings, pp. 322-333, 2008, Springer, 978-3-540-85482-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse |
Blob Analysis of the Head and Hands: A Method for Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Judee K. Burgoon, J. P. Blair, Renee E. Strom |
Heuristics and Modalities in Determining Truth Versus Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger |
An Approach for Intent Identification by Building on Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | David B. Christian, Robert Michael Young |
Strategic Deception in Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 3rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), 19-23 August 2004, New York, NY, USA, pp. 218-226, 2004, IEEE Computer Society, 1-58113-864-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Joey F. George, John R. Carlson |
Media Selection for Deceptive Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Joe Marshall, Steve Benford, Tony P. Pridmore |
Deception and magic in collaborative interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 567-576, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
misdirection, spectator interface, performance, interaction, ambiguity, trajectories, deception, magic, feedthrough |
31 | Hu Zhang 0003, Shan-de Wei, Hongye Tan, Jia-heng Zheng |
Deception Detection Based on SVM for Chinese Text in CMC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 481-486, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Chinese Text, SVM, CMC, Deception Detection |
31 | Debora Field, Allan Ramsay |
Sarcasm, Deception, and Stating the Obvious: Planning Dialogue without Speech Acts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Rev. ![In: Artif. Intell. Rev. 22(2), pp. 149-171, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
conversational record, deception, speech acts, AI planning, implicature |
31 | Zhanshan (Sam) Ma, Axel W. Krings, Chih-Cheng Hung |
The Handicap Principle for Trust in Computer Security, the Semantic Web and Social Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 458-468, 2009, Springer, 978-3-642-05249-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Handicap Principle, Animal Communication Network, Signal Honesty, Extended Evolutionary Game Theory, Pervasive and Resilient Computing, Semantic Web, Social Networking, Trust, Deception, Eavesdropping |
31 | Wanita Sherchan, Seng Wai Loke, Shonali Krishnaswamy |
Explanation-aware service selection: rationale and reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Serv. Oriented Comput. Appl. ![In: Serv. Oriented Comput. Appl. 2(4), pp. 203-218, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Collusion detection, Web services, Reputation, Recommendation, Explanation, Rationale, Deception detection |
31 | Matthias Rehm, Elisabeth André |
Catch me if you can: exploring lying agents in social settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 937-944, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
non-verbal behavior, embodied conversational agents, engagement, deception |
31 | Vinod Yegneswaran, Paul Barford, David Plonka |
On the Design and Use of Internet Sinks for Network Abuse Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 146-165, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Deception Systems, Intrusion Detection, Honeypots |
26 | Kang Chen, Zheng Lian, Haiyang Sun, Bin Liu, Jianhua Tao 0001 |
Can Deception Detection Go Deeper? Dataset, Evaluation, and Benchmark for Deception Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.11432, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Aswathy Velutharambath, Roman Klinger |
UNIDECOR: A Unified Deception Corpus for Cross-Corpus Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.02827, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Aswathy Velutharambath, Roman Klinger |
UNIDECOR: A Unified Deception Corpus for Cross-Corpus Deception Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASSA@ACL ![In: Proceedings of the 13th Workshop on Computational Approaches to Subjectivity, Sentiment, & Social Media Analysis, WASSA@ACL 2023, Toronto, Canada, July 14, 2023, pp. 39-51, 2023, Association for Computational Linguistics, 978-1-959429-87-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Wasiq Khan, Keeley A. Crockett, James O'Shea, Abir Hussain, Bilal Muhammed Khan |
Deception in the eyes of deceiver: A computer vision and machine learning based automated deception detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 169, pp. 114341, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Kelly Shortridge, Ryan Petrich |
Lamboozling Attackers: A New Generation of Deception: Software engineering teams can exploit attackers' human nature by building deception environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 19(5), pp. 26-59, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Md. Mazharul Islam 0001, Ehab Al-Shaer |
Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020, pp. 41-48, 2020, IEEE, 978-1-7281-8388-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1875 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|