1. Alford, R., Borck, H., Karneeb, J.: Active behavior recognition in beyond visual range air combat. In: Proceedings of the Third Annual Conference on Advances in Cognitive Systems (2015)
2. Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop - NSPW 2014, Victoria, BC, Canada, pp. 127–138. ACM Press (2014). https://doi.org/10.1145/2683467.2683482
3. Azuma, R., Daily, M., Furmanski, C.: A review of time critical decision making models and human cognitive processes. In: 2006 IEEE Aerospace Conference, pp. 9-pp. IEEE (2006)
4. Bell, J.B.: Toward a theory of deception. Int. J. Intell. Counterintell. 16(2), 244–279 (2003). https://doi.org/10.1080/08850600390198742
5. Bell, J.B., Whaley, B.: Cheating and Deception. Transaction Publishers, New Brunswick (1991)