This report describes the results of a three year research project about the use of deception in information protection. The work involved a collaboration between Sandia employees and students in the Center for Cyber Defenders (CCD) and at the University of California at Davis. This report includes a review of the history of deception, a discussion of some cognitive issues, an overview of previous work in deception, the results of experiments on the effects of deception on an attacker, and a mathematical model of error types associated with deception in computer systems
Deception is an important element in all natural and organisational systems. This paper outlines the...
Interactive deception among groups of humans regularly occurs. Barriers to studying this type of int...
Deception in computer-mediated communication is defined as a message knowingly and intentionally tra...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
This paper describes how basic concepts from information theory can be used to analyze deception. We...
Deceptions are based on psychology, and therefore special attention should be paid to the selection ...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
With the proliferation of electronic information systems over the last two decades, the integrity of...
This study explores the concept of trust and its relevance to deception operations. It proposes tha...
With the proliferation of electronic information systems over the last two decades, the integrity of...
For purposes of this chapter, we accept Vrij\u27s (2000) definition of deception as a successful or...
Master of ArtsDepartment of Communications StudiesGregory PaulPeople are sometimes deceptive, meanin...
Deception is an important element in all natural and organisational systems. This paper outlines the...
Interactive deception among groups of humans regularly occurs. Barriers to studying this type of int...
Deception in computer-mediated communication is defined as a message knowingly and intentionally tra...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
This paper describes how basic concepts from information theory can be used to analyze deception. We...
Deceptions are based on psychology, and therefore special attention should be paid to the selection ...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
With the proliferation of electronic information systems over the last two decades, the integrity of...
This study explores the concept of trust and its relevance to deception operations. It proposes tha...
With the proliferation of electronic information systems over the last two decades, the integrity of...
For purposes of this chapter, we accept Vrij\u27s (2000) definition of deception as a successful or...
Master of ArtsDepartment of Communications StudiesGregory PaulPeople are sometimes deceptive, meanin...
Deception is an important element in all natural and organisational systems. This paper outlines the...
Interactive deception among groups of humans regularly occurs. Barriers to studying this type of int...
Deception in computer-mediated communication is defined as a message knowingly and intentionally tra...