Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2973700
Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works…
read more here.
Keywords:
access;
file;
based deception;
file based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3533545
Abstract: Video-based deception detection has emerged as a promising field that leverages advances in computer vision, machine learning, and multimodal analysis to capture a wealth of nonverbal cues for identifying deceptive behavior. However, the field faces…
read more here.
Keywords:
deception detection;
review;
based deception;
video based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Transactions on Cybernetics"
DOI: 10.1109/tcyb.2025.3532547
Abstract: This article investigates the asynchronous estimator design for the interval type-2interval type-2 (IT2) fuzzy Markov jump systems subject to dynamic quantization and deception attacks. From the perspective of the attacker, a novel protocol-based deception attackdeception…
read more here.
Keywords:
deception attacks;
based deception;
quantization;
protocol based ... See more keywords