Cognitive Hacking: A Battle for the Mind
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. Information Warfare And Security , 1998 .
[2] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[3] Alberto Trombetta,et al. Optimal Comparison Strategies in Ulam's Searching Game with Two Errors , 1997, Theor. Comput. Sci..
[4] Pankaj Rohatgi,et al. Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.
[5] S. Ulam,et al. Adventures of a Mathematician , 2019, Mathematics: People · Problems · Results.
[6] K. Mani Chandy,et al. Parallel program design - a foundation , 1988 .
[7] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Clifford A. Lynch. When documents deceive: trust and provenance as new factors for information retrieval in a tangled web , 2001 .