A Framework for Deception
暂无分享,去创建一个
[1] C. L. Brewer. Introduction to Modern Psychology: The Control-Theory View. , 1991 .
[2] Alan L. Mackay,et al. The Code Breakers , 1984 .
[3] Martin S. Fridson,et al. Memoirs of Extraordinary Popular Delusions and the Madness of Crowds , 2019 .
[4] Fred Cohen. A Mathematical Structure of Simple Defensive Network Deception , 2000, Comput. Secur..
[5] Richards J. Heuer,et al. Psychology of Intelligence Analysis , 1999 .
[6] Daniel Chandler,et al. Personal Home Pages and the Construction of Identities on the Web , 1998 .
[7] Diana Deutsch,et al. Musical illusions and paradoxes , 1995 .
[8] Donald D. Hoffman. Visual Intelligence: How We Create What We See , 1998 .
[9] Chester Louis Karrass. The Negotiating Game , 1970 .
[10] J. Ratey. A User's Guide to the Brain , 2001 .
[11] James F. Dunnigan,et al. Victory and Deceit: Dirty Tricks at War , 1995 .
[12] Fred Cohen,et al. A note on the role of deception in information protection , 1998, Computers & security.
[13] P. Kalbfleisch. The Language of Detecting Deceit , 1994 .
[14] Fred Cohen,et al. Intrusion detection and response , 1997 .
[15] R. Cialdini,et al. Influence: Science & Practice , 1986 .
[16] Fred Cohen. Managing Network Security: What Does it do Behind Your Back? , 2000 .
[17] R. Cialdini. Influence: Science and Practice , 1984 .
[18] Frederick B. Cohen. A note on distributed coordinated attacks , 1996, Comput. Secur..
[19] T. Gilovich,et al. How We Know What Isn't So: The Fallibility of Human Reason in Everyday Life , 1991 .
[20] Charles K. West. The Social and Psychological Distortion of Information , 1981 .
[21] Fred Cohen. Managing network security - The unpredictability of defence , 1998 .
[22] J. Keegan,et al. A History of Warfare. , 1995 .
[23] Donald C. Daniel,et al. Strategic military deception , 1982 .
[24] Encyclopedia of hoaxes , 1993 .
[25] Fred Cohen. Managing Network Security: Understanding Viruses Bio-logically , 2000 .
[26] B. Cheswick. An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied , 1997 .
[27] Steven M. Bellovin,et al. There Be Dragons , 1992, USENIX Summer.
[28] Robert W. Mitchell,et al. Deception, perspectives on human and nonhuman deceit , 1986 .
[29] Fred Cohen. Managing network security - Red teaming , 1998 .