Font Size: a A A
Keyword [deception]
Result: 181 - 200 | Page: 10 of 10
181. Research And Implementation Of Cyber Deception System Based On SDN
182. Research And Implementation Of Deception Honeynet Environment Orchestration System Based On Cloud Computing
183. Research On Intranet Threat Awareness Technology Based On Honeypot
184. Research On The Safety Control Method Of Networked Control System Based On The Memory-type Event Trigger Mechanism
185. Success analysis of deception in wireless sensor networks
186. Intelligent tutoring for interviewing to detect deception: Can investigator be trained to elicit and detect accurate cues to deception?
187. Detecting deception in speech
188. Deception in wireless sensor networks - Predicting intruder behavior
189. Cultural determinants of media choice for deception
190. The Application of Deception to Software Security Patchin
191. Using natural language processing to identify the rhetoric of deception in business and competitive intelligence email communications
192. Modelling deception detection in text
193. Doing good by stealth? Democracy, deception, and the use of force
194. A deception framework for wireless sensor networks
195. The role of psychophysiology in forensic assessments: Deception detection, ERPs and virtual reality mock crime scenarios
196. Courting inauthenticity: Deception and revelation in American autobiography
197. Augmenting human intellect: Automatic recognition of nonverbal behavior with application in deception detection
198. Building a theory of strategic deception
199. Identifying deception using novel technology-based approaches to uncover concealed information
200. The deceived and discovery of serious deception
  <<First  <Prev  Next>  Last>>  Jump to