Results 111 to 120 of about 296,174 (298)

Stealthy Deception Attacks Against SCADA Systems

open access: yes, 2017
SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values ...
A Kleinmann   +12 more
core   +1 more source

Self-Deception, Delusion and the Boundaries of Folk Psychology

open access: yesHumana.Mente: Journal of Philosophical Studies, 2018
To what extent do self-deception and delusion overlap? In this paper we argue that both self-deception and delusions can be understood in folk-psychological terms.
Lisa Bortolotti, Matteo Mameli
doaj  

Framing National Education in Hong Kong: A frame analysis of power dynamics in stakeholders' competing narratives

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This article examines how national education in Hong Kong functions as a contested arena in which state and non‐state actors struggle over the meaning of citizenship, identity and schooling. Using inductive frame analysis of 319 news articles (2020–2025) from five Chinese‐ and English‐language outlets, it identifies diagnostic, prognostic and ...
Jason Cong Lin
wiley   +1 more source

Deception 101 - Primer on Deception [PDF]

open access: yes, 2004
Abstract : Deception is a traditional component of political and military conflict. Indeed, many argue that it is intrinsic to all human interaction. It is sometimes mistakenly confused with unintentional confusion or misinformation. Disinformation, intentional deception, should not be confused with misinformation.
openaire   +1 more source

Injuries in deep time: interpreting competitive behaviours in extinct reptiles via palaeopathology

open access: yesBiological Reviews, EarlyView.
ABSTRACT For over a century, palaeopathology has been used as a tool for understanding evolution, disease in past communities and populations, and to interpret behaviour of extinct taxa. Physical traumas in particular have frequently been the justification for interpretations about aggressive and even competitive behaviours in extinct taxa.
Maximilian Scott   +3 more
wiley   +1 more source

The flexible, the stereotyped and the in‐between: putting together the combinatory tool use origins hypothesis

open access: yesBiological Reviews, EarlyView.
ABSTRACT Tool use research has long made the distinction between tool using that is considered learned and flexible, and that which appears to be instinctive and stereotyped. However, animals with an inherited tool use specialisation can exhibit flexibility, while tool use that is spontaneously innovated can be limited in its expression and facilitated
Jennifer A. D. Colbourne   +1 more
wiley   +1 more source

100 Horsemen and the Empty City: A Game Theoretic Exploration of Deception in Chinese Military Legend [PDF]

open access: yes
game theory, signaling game, bluffing, deterrence ...
Chang Liu, Christopher Cotton
core  

The impacts of biological invasions

open access: yesBiological Reviews, EarlyView.
ABSTRACT The Anthropocene is characterised by a continuous human‐mediated reshuffling of the distributions of species globally. Both intentional and unintentional introductions have resulted in numerous species being translocated beyond their native ranges, often leading to their establishment and subsequent spread – a process referred to as biological
Phillip J. Haubrock   +42 more
wiley   +1 more source

The As and Bs of titi monkey linguistics: why emotional communication is not the enemy

open access: yesBiological Reviews, EarlyView.
ABSTRACT The alarm call sequences of titi monkeys (genera Plecturocebus, Callicebus and Cheracebus) have sparked important debates over whether they exhibit parallels with human language. Some researchers consider these sequences to involve both semantics and syntax, while others argue that the sequences convey semantic information without syntax.
Mélissa Berthet   +2 more
wiley   +1 more source

Qualitative Methods for Classifying and Detecting Online Identity Deception [PDF]

open access: yes
The overall aim of our research is to use qualitative methods to help understand online identity deception. In this position paper, two pilot studies are described.
Mair, Carolyn, Taylor, Jacqui
core  

Home - About - Disclaimer - Privacy