COGNITIVE HACKING : TECHNOLOGICAL AND LEGAL ISSUES
暂无分享,去创建一个
George Cybenko | Annarita Giani | Carey Heckman | G. Cybenko | A. Giani | Paul Thompson | Paul Thompson | Carey Heckman
[1] Clifford A. Lynch,et al. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web , 2001, J. Assoc. Inf. Sci. Technol..
[2] George Cybenko,et al. Cognitive Hacking and the Value of Information , 2004 .
[3] George Cybenko,et al. Cognitive Hacking: A Battle for the Mind , 2002, Computer.
[4] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[5] Martin C. Libicki. The Mesh and The Net: Speculations on Armed Conflict in a Time of Free Silicon , 2004 .
[6] Jacob O. Wobbrock,et al. Put your best face forward: anthropomorphic agents, e-commerce consumers, and the law , 2000, AGENTS '00.
[7] Alberto Trombetta,et al. Optimal Comparison Strategies in Ulam's Searching Game with Two Errors , 1997, Theor. Comput. Sci..
[8] Chrysanthos Dellarocas,et al. Building Trust On-Line: The Design of Reliable Reputation Reporting : Mechanisms for Online Trading Communities , 2001 .