A Framework for Deception

[1]  C. L. Brewer Introduction to Modern Psychology: The Control-Theory View. , 1991 .

[2]  Alan L. Mackay,et al.  The Code Breakers , 1984 .

[3]  Martin S. Fridson,et al.  Memoirs of Extraordinary Popular Delusions and the Madness of Crowds , 2019 .

[4]  Fred Cohen A Mathematical Structure of Simple Defensive Network Deception , 2000, Comput. Secur..

[5]  Richards J. Heuer,et al.  Psychology of Intelligence Analysis , 1999 .

[6]  Daniel Chandler,et al.  Personal Home Pages and the Construction of Identities on the Web , 1998 .

[7]  Diana Deutsch,et al.  Musical illusions and paradoxes , 1995 .

[8]  Donald D. Hoffman Visual Intelligence: How We Create What We See , 1998 .

[9]  Chester Louis Karrass The Negotiating Game , 1970 .

[10]  J. Ratey A User's Guide to the Brain , 2001 .

[11]  James F. Dunnigan,et al.  Victory and Deceit: Dirty Tricks at War , 1995 .

[12]  Fred Cohen,et al.  A note on the role of deception in information protection , 1998, Computers & security.

[13]  P. Kalbfleisch The Language of Detecting Deceit , 1994 .

[14]  Fred Cohen,et al.  Intrusion detection and response , 1997 .

[15]  R. Cialdini,et al.  Influence: Science & Practice , 1986 .

[16]  Fred Cohen Managing Network Security: What Does it do Behind Your Back? , 2000 .

[17]  R. Cialdini Influence: Science and Practice , 1984 .

[18]  Frederick B. Cohen A note on distributed coordinated attacks , 1996, Comput. Secur..

[19]  T. Gilovich,et al.  How We Know What Isn't So: The Fallibility of Human Reason in Everyday Life , 1991 .

[20]  Charles K. West The Social and Psychological Distortion of Information , 1981 .

[21]  Fred Cohen Managing network security - The unpredictability of defence , 1998 .

[22]  J. Keegan,et al.  A History of Warfare. , 1995 .

[23]  Donald C. Daniel,et al.  Strategic military deception , 1982 .

[24]  Encyclopedia of hoaxes , 1993 .

[25]  Fred Cohen Managing Network Security: Understanding Viruses Bio-logically , 2000 .

[26]  B. Cheswick An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied , 1997 .

[27]  Steven M. Bellovin,et al.  There Be Dragons , 1992, USENIX Summer.

[28]  Robert W. Mitchell,et al.  Deception, perspectives on human and nonhuman deceit , 1986 .

[29]  Fred Cohen Managing network security - Red teaming , 1998 .