Results 11 to 20 of about 4,980 (160)

Survey of software anomaly detection based on deception

open access: yes网络与信息安全学报, 2022
Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security ...
Jianming FU   +3 more
doaj   +3 more sources

Computational Measures of Deceptive Language: Prospects and Issues

open access: yesFrontiers in Communication, 2022
In this article, we wish to foster a dialogue between theory-based and classification-oriented stylometric approaches regarding deception detection. To do so, we review how cue-based and model-based stylometric systems are used to detect deceit. Baseline
Frédéric Tomas   +3 more
doaj   +1 more source

IT’S THE INTENTION THAT COUNTS. A REVIEW ON DECEPTION DETECTION FOCUSED ON INTENTIONS [PDF]

open access: yesPapeles del Psicólogo, 2018
For years the research on deception detection has been guided by classical theories that support the idea that the liar gives out behavioral indicators which betray him/her. Within the new lines of research, deception detection focused on intentions has
María Carmen Feijoo Fernández   +1 more
doaj   +1 more source

The tangled webs they weave: A scoping review of deception detection and production in relation to Dark Triad traits

open access: yesActa Psychologica, 2022
People deceive for different reasons, from avoiding interpersonal conflicts to preserving, protecting, and nurturing interpersonal relationships, and to obtaining social status and power.
Andreea Turi   +2 more
doaj   +1 more source

The role of conflict processing mechanism in deception responses

open access: yesScientific Reports, 2022
A considerable number of studies have described the potential neural mechanism of deception, but most deception studies have relied upon deception from experimental supervisor instruction. Experimental control (participants follow instructions to deceive
Jintao Wu   +4 more
doaj   +1 more source

The Dark Triad and Deception Perceptions

open access: yesFrontiers in Psychology, 2019
The present cross-sectional study (N = 205) tested the hypothesis that the Dark Triad traits – narcissism, Machiavellianism, and psychopathy – and the PID-5 maladaptive personality traits – Negative Affectivity, Detachment, Antagonism, Disinhibition, and
Benno Gerrit Wissing   +1 more
doaj   +1 more source

A comparison of the effectiveness of two types of deceit detection training methods in older adults

open access: yesCognitive Research, 2019
Background In general, people are poor at detecting deception. Older adults are even worse than young adults at detecting deceit, which might make them uniquely vulnerable to certain types of financial fraud.
Jennifer Tehan Stanley   +1 more
doaj   +1 more source

Characteristic Parameter Optimization of Wireless Flaw Sensing System Based on Active Interference Suppression Algorithm

open access: yesDiscrete Dynamics in Nature and Society, 2021
Based on the active interference suppression algorithm, this study combines the radar working mode and the interference type and realizes the effective detection of the flaw detection signal by successively processing the radar receiving signal and the ...
Wenping Wu
doaj   +1 more source

A Corpus-Based Study of Linguistic Deception in Spanish

open access: yesApplied Sciences, 2021
In the last decade, fields such as psychology and natural language processing have devoted considerable attention to the automatization of the process of deception detection, developing and employing a wide array of automated and computer-assisted ...
Ángela Almela
doaj   +1 more source

You can’t kid a kidder: Association between production and detection of deception in an interactive deception task

open access: yesFrontiers in Human Neuroscience, 2012
Both the ability to deceive others, and the ability to detect deception, have long been proposed to confer an evolutionary advantage. Deception detection has been studied extensively, and the finding that typical individuals fare little better than ...
Gordon R.T. Wright   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy