Results 11 to 20 of about 71,438 (359)

Investigation of the Uniformity of Gel Shrinkage by Imaging Tracer Particles Using X‐Ray Microtomography

open access: yesAdvanced Engineering Materials, EarlyView., 2023
A novel method for tracking structural changes in gels using widely accessible microcomputed tomography is presented and validated for various hydro‐, alco‐, and aerogels. The core idea of the method is to track positions of micrometer‐sized tracer particles entrapped in the gel and relate them to the density of the gel network.
Anja Hajnal   +3 more
wiley   +1 more source

Deception about study purpose does not affect participant behavior

open access: yesScientific Reports, 2022
The use of deception in research is divisive along disciplinary lines. Whereas psychologists argue that deception may be necessary to obtain unbiased measures, economists hold that deception can generate suspicion of researchers, invalidating measures ...
Zoe Rahwan   +2 more
doaj   +1 more source

Three Decades of Deception Techniques in Active Cyber Defense -- Retrospect and Outlook [PDF]

open access: yesComputers & Security, Vol. 106, 102288, Elsevier, 2021, 2021
Deception techniques have been widely seen as a game changer in cyber defense. In this paper, we review representative techniques in honeypots, honeytokens, and moving target defense, spanning from the late 1980s to the year 2021. Techniques from these three domains complement with each other and may be leveraged to build a holistic deception based ...
arxiv   +1 more source

An Honest Joker reveals stereotypical beliefs about the face of deception

open access: yesScientific Reports, 2023
Research on deception detection has mainly focused on Simple Deception, in which false information is presented as true. Relatively few studies have examined Sophisticated Deception, in which true information is presented as false.
Xingchen Zhou, Rob Jenkins, Lei Zhu
doaj   +1 more source

Static Output Feedback Quantized Control for Fuzzy Markovian Switching Singularly Perturbed Systems With Deception Attacks

open access: yesIEEE transactions on fuzzy systems, 2022
This article focuses on static output feedback control for fuzzy Markovian switching singularly perturbed systems (FMSSPSs) with deception attacks and asynchronous quantized measurement output.
Jun Cheng   +4 more
semanticscholar   +1 more source

A Theory of Deception [PDF]

open access: yesAmerican Economic Journal: Microeconomics, 2010
This paper proposes an equilibrium approach to belief manipulation and deception in which agents only have coarse knowledge of their opponent's strategy. Equilibrium requires the coarse knowledge available to agents to be correct, and the inferences and optimizations to be made on the basis of the simplest theories compatible with the available ...
Ettinger, David, Jehiel, Philippe
openaire   +7 more sources

Contextual considerations for deception production and detection in forensic interviews

open access: yesFrontiers in Psychology, 2023
Most deception scholars agree that deception production and deception detection effects often display mixed results across settings. For example, some liars use more emotion than truth-tellers when discussing fake opinions on abortion, but not when ...
David M. Markowitz   +3 more
doaj   +1 more source

The role of conflict processing mechanism in deception responses

open access: yesScientific Reports, 2022
A considerable number of studies have described the potential neural mechanism of deception, but most deception studies have relied upon deception from experimental supervisor instruction. Experimental control (participants follow instructions to deceive
Jintao Wu   +4 more
doaj   +1 more source

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

open access: yesSensors, 2022
With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense.
Pilla Vaishno Mohan   +5 more
doaj   +1 more source

A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty

open access: yesGames, 2022
In security games, the defender often has to predict the attacker’s behavior based on some observed attack data. However, a clever attacker can intentionally change its behavior to mislead the defender’s learning, leading to an ineffective defense ...
Thanh Hong Nguyen, Amulya Yadav
doaj   +1 more source

Home - About - Disclaimer - Privacy