Results 11 to 20 of about 4,980 (160)
Survey of software anomaly detection based on deception
Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security ...
Jianming FU +3 more
doaj +3 more sources
Computational Measures of Deceptive Language: Prospects and Issues
In this article, we wish to foster a dialogue between theory-based and classification-oriented stylometric approaches regarding deception detection. To do so, we review how cue-based and model-based stylometric systems are used to detect deceit. Baseline
Frédéric Tomas +3 more
doaj +1 more source
IT’S THE INTENTION THAT COUNTS. A REVIEW ON DECEPTION DETECTION FOCUSED ON INTENTIONS [PDF]
For years the research on deception detection has been guided by classical theories that support the idea that the liar gives out behavioral indicators which betray him/her. Within the new lines of research, deception detection focused on intentions has
María Carmen Feijoo Fernández +1 more
doaj +1 more source
People deceive for different reasons, from avoiding interpersonal conflicts to preserving, protecting, and nurturing interpersonal relationships, and to obtaining social status and power.
Andreea Turi +2 more
doaj +1 more source
The role of conflict processing mechanism in deception responses
A considerable number of studies have described the potential neural mechanism of deception, but most deception studies have relied upon deception from experimental supervisor instruction. Experimental control (participants follow instructions to deceive
Jintao Wu +4 more
doaj +1 more source
The Dark Triad and Deception Perceptions
The present cross-sectional study (N = 205) tested the hypothesis that the Dark Triad traits – narcissism, Machiavellianism, and psychopathy – and the PID-5 maladaptive personality traits – Negative Affectivity, Detachment, Antagonism, Disinhibition, and
Benno Gerrit Wissing +1 more
doaj +1 more source
A comparison of the effectiveness of two types of deceit detection training methods in older adults
Background In general, people are poor at detecting deception. Older adults are even worse than young adults at detecting deceit, which might make them uniquely vulnerable to certain types of financial fraud.
Jennifer Tehan Stanley +1 more
doaj +1 more source
Based on the active interference suppression algorithm, this study combines the radar working mode and the interference type and realizes the effective detection of the flaw detection signal by successively processing the radar receiving signal and the ...
Wenping Wu
doaj +1 more source
A Corpus-Based Study of Linguistic Deception in Spanish
In the last decade, fields such as psychology and natural language processing have devoted considerable attention to the automatization of the process of deception detection, developing and employing a wide array of automated and computer-assisted ...
Ángela Almela
doaj +1 more source
Both the ability to deceive others, and the ability to detect deception, have long been proposed to confer an evolutionary advantage. Deception detection has been studied extensively, and the finding that typical individuals fare little better than ...
Gordon R.T. Wright +2 more
doaj +1 more source

