This article presents findings concerned with the use of neural networks in the identification of deceptive behaviour. A game designed by psychologists and criminologists was used for the generation of data used to test the appropriateness of different AI techniques in the quest for counter-terrorism. A feed forward back propagation network was developed and subsequent neural network experiments showed on average a 60% success rate and at best a 68% success rate for correctly identifying deceptive behaviour. These figures indicate that, as part of an investigator support system, a neural network would be a valuable tool in the identification of terrorists prior to an attack.</p
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Cyber-attacks present a greater threat to individuals and the security of the modern state in the gl...
Under the umbrella of Technology, there has been a rising interest in the following topics, Artifici...
This article presents findings concerned with the use of neural networks in the identification of de...
One of the most important threats to today’s civilization is terrorism. Terrorism not only disturbs ...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Computer network attackers currently benefit from an asymmetric advantage, leveraging both features ...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Abstract—In the literature, there were many research efforts that utilized the artificial immune net...
The potential damage to computer networks keeps increasing due to a growing reliance on the Internet...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
Computer networks have employed a variety of techniques to secure themselves from attackers. A techn...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Cyber-attacks present a greater threat to individuals and the security of the modern state in the gl...
Under the umbrella of Technology, there has been a rising interest in the following topics, Artifici...
This article presents findings concerned with the use of neural networks in the identification of de...
One of the most important threats to today’s civilization is terrorism. Terrorism not only disturbs ...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
The prevention of any type of cyber attack is indispensable because a single attack may break the se...
Computer network attackers currently benefit from an asymmetric advantage, leveraging both features ...
AbstractThe potential damage to computer networks keeps increasing due to a growing reliance on the ...
Abstract—In the literature, there were many research efforts that utilized the artificial immune net...
The potential damage to computer networks keeps increasing due to a growing reliance on the Internet...
Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situat...
Computer networks have employed a variety of techniques to secure themselves from attackers. A techn...
The emergent damage to computer network keeps increasing due to an extensive and prevalent connectiv...
A solo attack may cause a big loss in computer and network systems, its prevention is, therefore, ve...
Cyber-attacks present a greater threat to individuals and the security of the modern state in the gl...
Under the umbrella of Technology, there has been a rising interest in the following topics, Artifici...