Author:
Heckman Kristin E.,Stech Frank J.,Thomas Roshan K.,Schmoker Ben,Tsow Alexander W.
Publisher
Springer International Publishing
Reference35 articles.
1. Bennett, M., & Waltz, E. (2007). Counterdeception principles and applications for national security. Norwood, MA: Artech House.
2. Bloom, R. (2013) Foundations of Psychological Profiling: Terrorism, Espionage, and Deception. Boca Raton, FL: Taylor & Francis Group.
3. Bodmer, S., M. Kilger, G. Carpenter, and J. Jones (2012) Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill: New York.
4. Carroll, T. E., & Grosu, D. (2011). A game theoretic investigation of deception in network security. Security and Communication Networks, 4(10), 1162-1172.
5. Caverni, F. & M. Gonzalez, eds. (1990) Cognitive Biases. New York: Elsevier.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cyber Counterintelligence;International Journal of Cyber Warfare and Terrorism;2019-10