Gotowa bibliografia na temat „Detecting deception”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Detecting deception”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Detecting deception"
Gergen, Kenneth J. "Detecting deception". Behavioral and Brain Sciences 20, nr 1 (marzec 1997): 114–15. http://dx.doi.org/10.1017/s0140525x97350031.
Pełny tekst źródłaLykken, David T. "Detecting deception". Society 22, nr 6 (wrzesień 1985): 34–39. http://dx.doi.org/10.1007/bf02695837.
Pełny tekst źródłaWu, Jiang, i Yangyang Liu. "Deception detection methods incorporating discourse network metrics in synchronous computer-mediated communication". Journal of Information Science 46, nr 1 (22.01.2019): 64–81. http://dx.doi.org/10.1177/0165551518823176.
Pełny tekst źródłaKuzio, Anna. "The role of sex differences in detecting deception in computer-mediated communication in English". Journal of Computer-Assisted Linguistic Research 2, nr 1 (12.07.2018): 39. http://dx.doi.org/10.4995/jclr.2018.10521.
Pełny tekst źródłaMurphy, Kevin R. "Detecting infrequent deception." Journal of Applied Psychology 72, nr 4 (listopad 1987): 611–14. http://dx.doi.org/10.1037/0021-9010.72.4.611.
Pełny tekst źródłaPicornell, Isabel. "Analysing Deception in Written Witness Statements". Linguistic Evidence in Security, Law and Intelligence 1, nr 1 (6.12.2013): 41–50. http://dx.doi.org/10.5195/lesli.2013.2.
Pełny tekst źródłaGrosch, James W., i John E. Sparrow. "Detecting Deception: A Classroom Demonstration". Teaching of Psychology 19, nr 3 (październik 1992): 166–68. http://dx.doi.org/10.1207/s15328023top1903_10.
Pełny tekst źródłaTsikerdekis, Michail, i Sherali Zeadally. "Detecting Online Content Deception". IT Professional 22, nr 2 (1.03.2020): 35–44. http://dx.doi.org/10.1109/mitp.2019.2961638.
Pełny tekst źródłaLuke, Timothy J. "Lessons From Pinocchio: Cues to Deception May Be Highly Exaggerated". Perspectives on Psychological Science 14, nr 4 (7.06.2019): 646–71. http://dx.doi.org/10.1177/1745691619838258.
Pełny tekst źródłaLevine, Timothy R. "Active Deception Detection". Policy Insights from the Behavioral and Brain Sciences 1, nr 1 (październik 2014): 122–28. http://dx.doi.org/10.1177/2372732214548863.
Pełny tekst źródłaRozprawy doktorskie na temat "Detecting deception"
Hu, Hang. "Characterizing and Detecting Online Deception via Data-Driven Methods". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/98575.
Pełny tekst źródłaDoctor of Philosophy
In recent years, online deception becomes a major threat to information security. The most common form of online deception starts with a phishing email, then redirects targets to a phishing website where the attacker tricks targets sharing their credentials. General phishing emails are relatively easy to recognize from both the target's and the defender's perspective. They are usually from strange addresses, the content is usually very general and they come in a large volume. However, Online deception that caused significant consequences is usually spear phishing. Spear-phishing emails come in a very small volume, target a small number of audiences, sometimes impersonate a trusted entity and use very specific content to redirect targets to a phishing website, where the attacker tricks targets sharing their credentials. Sometimes, attackers use domain impersonation techniques to make the phishing website even more convincing. In this thesis, we measure the entire process. Starting from phishing emails, we examine anti-spoofing protocols, analyze email services' policies and warnings towards spoofing emails, and measure the email tracking ecosystem. With phishing websites, we implement a tool to detect domain name impersonation and detect phishing pages using dynamic and static analysis. We also studied credential sharing on phishing websites. We measure what happens after targets share their credentials. Finally, we analyze potential phishing and privacy concerns on new platforms such as Alexa and Google Assistant.
Albrechtsen, Justin Scott. "Are intuitive responses more accurate at detecting deception than deliberate responses?" To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2007. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Pełny tekst źródłaTaylor, Rachel Janet. "Factors affecting accuracy of detecting deception in experts and lay people". Thesis, University of Manchester, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488228.
Pełny tekst źródłaVernham, Zarah. "No safety in numbers : detecting deception using a collective interviewing approach". Thesis, University of Portsmouth, 2015. https://researchportal.port.ac.uk/portal/en/theses/no-safety-in-numbers(1c276255-c8ed-4eff-b2d0-684eacb335c5).html.
Pełny tekst źródłaZoumpoulaki, Alexia. "Detecting perceptual breakthrough in RSVP with applications in deception detection methodological, behavioural and electrophysiological explorations". Thesis, University of Kent, 2016. https://kar.kent.ac.uk/61386/.
Pełny tekst źródłaMäättä, Jessica. "Embodied Cognition and Deception : The Influence of Emotional Congruence in Detecting Lies". Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-6418.
Pełny tekst źródłaGonzalez, Therese. "Avslöjad av ditt kroppsspråk? : Kroppsspråkets betydelse vid bedömning av lögn". Thesis, Mälardalens högskola, Akademin för hållbar samhälls- och teknikutveckling, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-10669.
Pełny tekst źródłaMann, Samantha Ann. "Suspects, lies and videotape : an investigation into telling and detecting lies in police/suspect interviews". Thesis, University of Portsmouth, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.369425.
Pełny tekst źródłaTwyman, Nathan W. "Automated Human Screening for Detecting Concealed Knowledge". Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/222874.
Pełny tekst źródłaEast, Rebekah Psychology Faculty of Science UNSW. "Happy and gullible, sad and wise? Mood effects on factual and interpersonal skepticism". Awarded by:University of New South Wales. Psychology, 2006. http://handle.unsw.edu.au/1959.4/24371.
Pełny tekst źródłaKsiążki na temat "Detecting deception"
Granhag, Pär Anders, Aldert Vrij i Bruno Verschuere, red. Detecting Deception. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.
Pełny tekst źródłaHall, Harold V., i Joseph G. Poirier. Detecting Malingering and Deception. Third edition. | Boca Raton : CRC Press, [2020] | Series: Pacific Institute series on forensic psychology: CRC Press, 2020. http://dx.doi.org/10.4324/9780429423031.
Pełny tekst źródłaG, Poirier Joseph, red. Detecting malingering and deception: Forensic distortion analysis. Wyd. 2. Boca Raton, Fla: CRC Press, 2001.
Znajdź pełny tekst źródłaSubrahmanian, V. S., Judee K. Burgoon i Norah E. Dunbar, red. Detecting Trust and Deception in Group Interaction. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54383-9.
Pełny tekst źródłaA, Pritchard David, red. Detecting malingering and deception: Forensic distortion analysis (FDA). Delray Beach, Fla: St. Lucie Press, 1996.
Znajdź pełny tekst źródłaHall, Harold V. Detecting malingering and deception: The revised forensic distortion analysis. Wyd. 2. Boca Raton, FL: CRC Press, 2000.
Znajdź pełny tekst źródłaPonticelli, Theodore. Detecting deception: Polygraph instruments, standards procedures-- for the practitioner. Jacksonville, Fla: Institute of Police Technology and Management, 2005.
Znajdź pełny tekst źródłaVrij, Aldert. Detecting lies and deceit: Pitfalls and opportunities. Wyd. 2. Chichester: John Wiley, 2008.
Znajdź pełny tekst źródłaVrij, Aldert. Detecting lies and deceit: The psychology of lying and the implications for professional practice. Chichester: John Wiley, 2001.
Znajdź pełny tekst źródłaClifton, Charles. Deception detection: Winning the polygraph game. Boulder, Colo: Paladin Press, 1991.
Znajdź pełny tekst źródłaCzęści książek na temat "Detecting deception"
Vrij, Aldert. "Verbal Lie Detection Tools". W Detecting Deception, 1–35. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch1.
Pełny tekst źródłaGranhag, Pär anders, i Maria Hartwig. "The Strategic Use of Evidence Technique". W Detecting Deception, 231–51. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch10.
Pełny tekst źródłaGanis, Giorgio. "Investigating Deception and Deception Detection with Brain Stimulation Methods". W Detecting Deception, 253–68. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch11.
Pełny tekst źródłaVerschuere, Bruno, Kristina Suchotzki i Evelyne Debey. "Detecting Deception Through Reaction Times". W Detecting Deception, 269–91. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch12.
Pełny tekst źródłaGranhag, Pär Anders, Maria Hartwig, Erik Mac Giolla i Franziska Clemens. "Suspects’ Verbal Counter-Interrogation Strategies". W Detecting Deception, 293–313. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch13.
Pełny tekst źródłaElaad, Eitan. "Covert Detection of Deception". W Detecting Deception, 315–38. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch14.
Pełny tekst źródłaBond, Charles F., Timothy R. Levine i Maria Hartwig. "New Findings in Non-Verbal Lie Detection". W Detecting Deception, 37–58. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch2.
Pełny tekst źródłaMeijer, Ewout H., i Bruno Verschuere. "The Polygraph". W Detecting Deception, 59–80. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch3.
Pełny tekst źródłaIacono, William G. "Forensic Application of Event-Related Brain Potentials to Detect Guilty Knowledge". W Detecting Deception, 81–103. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch4.
Pełny tekst źródłaGanis, Giorgio. "Deception Detection Using Neuroimaging". W Detecting Deception, 105–21. Chichester, UK: John Wiley & Sons, Ltd, 2014. http://dx.doi.org/10.1002/9781118510001.ch5.
Pełny tekst źródłaStreszczenia konferencji na temat "Detecting deception"
Rowe, Neil C. "Detecting Suspicious Behavior From Only Positional Data With Distributed Sensor Networks". W ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-84420.
Pełny tekst źródłaLittle, A., i D. B. Skillicorn. "Detecting deception in testimony". W 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565022.
Pełny tekst źródłaYu, Bin, i Munindar P. Singh. "Detecting deception in reputation management". W the second international joint conference. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/860575.860588.
Pełny tekst źródłaLamb, C. E., i D. B. Skillicorn. "Detecting deception in interrogation settings". W 2013 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2013. http://dx.doi.org/10.1109/isi.2013.6578809.
Pełny tekst źródłaEnos, Frank, Elizabeth Shriberg, Martin Graciarena, Julia Hirschberg i Andreas Stolcke. "Detecting deception using critical segments". W Interspeech 2007. ISCA: ISCA, 2007. http://dx.doi.org/10.21437/interspeech.2007-619.
Pełny tekst źródłaAlowibdi, Jalal S., Ugo A. Buy, Philip S. Yu i Leon Stenneth. "Detecting deception in Online Social Networks". W 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 2014. http://dx.doi.org/10.1109/asonam.2014.6921614.
Pełny tekst źródłaFranke, Ulrik, i Magnus Rosell. "Prospects for Detecting Deception on Twitter". W 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2014. http://dx.doi.org/10.1109/ficloud.2014.92.
Pełny tekst źródłaSantos, Jr., Eugene, i Gregory Johnson, Jr. "Toward detecting deception in intelligent systems". W Defense and Security, redaktorzy Dawn A. Trevisani i Alex F. Sisti. SPIE, 2004. http://dx.doi.org/10.1117/12.547296.
Pełny tekst źródłaPavur, James, i Ivan Martinovic. "On Detecting Deception in Space Situational Awareness". W ASIA CCS '21: ACM Asia Conference on Computer and Communications Security. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3433210.3453081.
Pełny tekst źródłaOndras, Jan, i Hatice Gunes. "Detecting Deception and Suspicion in Dyadic Game Interactions". W ICMI '18: INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3242969.3242993.
Pełny tekst źródłaRaporty organizacyjne na temat "Detecting deception"
Doyle, Jon. Detecting Deception in Multiscale Activity Graphs. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2012. http://dx.doi.org/10.21236/ada580490.
Pełny tekst źródłaStech, Frank J., i Christopher Elsaesser. Midway Revisited: Detecting Deception by Analysis of Competing Hypothesis. Fort Belvoir, VA: Defense Technical Information Center, listopad 2004. http://dx.doi.org/10.21236/ada428173.
Pełny tekst źródłaMatsumoto, David, Hyisung C. Hwang, Adam M. Fullenkamp i C. M. Laurent. Human Deception Detection from Whole Body Motion Analysis. Fort Belvoir, VA: Defense Technical Information Center, grudzień 2015. http://dx.doi.org/10.21236/ada626755.
Pełny tekst źródłaStern, Robert M., i John C. Kircher. The Effects of Augmented Physiological Feedback on Detection of Deception. Fort Belvoir, VA: Defense Technical Information Center, marzec 2002. http://dx.doi.org/10.21236/ada400823.
Pełny tekst źródłaSantos, Jr, i Eugene. Deception Detection in Expert Source Information Through Bayesian Knowledge-Bases. Fort Belvoir, VA: Defense Technical Information Center, luty 2008. http://dx.doi.org/10.21236/ada531719.
Pełny tekst źródłaKircher, John C., Sean D. Kristjansson, Michael K. Gardner i Andrea Webb. Human and Computer Decision-making in the Psychophysiological Detection of Deception. Fort Belvoir, VA: Defense Technical Information Center, marzec 2005. http://dx.doi.org/10.21236/ada520590.
Pełny tekst źródłaVendemia, Jennifer M. Brain Imaging Research: The Detection of Deception Utilizing HD-ERP, fMRI, and Pupillometry. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2009. http://dx.doi.org/10.21236/ada513920.
Pełny tekst źródłaKircher, John C., Ted Packard, Brian G. Bell i Paul C. Bernhard. Comparison of Skin Conductance and Skin Resistance Measures for the Detection of Deception. Fort Belvoir, VA: Defense Technical Information Center, październik 2001. http://dx.doi.org/10.21236/ada404127.
Pełny tekst źródłaIngram, Eben M. Test of a Mock Theft Scenario for Use in the Psychophysiological Detection of Deception: II,. Fort Belvoir, VA: Defense Technical Information Center, marzec 1997. http://dx.doi.org/10.21236/ada325487.
Pełny tekst źródłaCarlton, Barbara L., i Brenda J. Smith. The Effects of Aural Versus Visual Presentations of Questions During a Detection of Deception Task. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1991. http://dx.doi.org/10.21236/ada304657.
Pełny tekst źródła