Articles with "based deception" as a keyword



PhantomFS: File-Based Deception Technology for Thwarting Malicious Users

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2973700

Abstract: File-based deception technologies can be used as an additional security barrier when adversaries have successfully gained access to a host evading intrusion detection systems. Adversaries are detected if they access fake files. Though previous works… read more here.

Keywords: access; file; based deception; file based ... See more keywords

Advancements and Challenges in Video-Based Deception Detection: A Systematic Literature Review of Datasets, Modalities, and Methods

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Access"

DOI: 10.1109/access.2025.3533545

Abstract: Video-based deception detection has emerged as a promising field that leverages advances in computer vision, machine learning, and multimodal analysis to capture a wealth of nonverbal cues for identifying deceptive behavior. However, the field faces… read more here.

Keywords: deception detection; review; based deception; video based ... See more keywords

Dissipative Estimating for Nonlinear Markov Systems With Protocol-Based Deception Attacks and Measurement Quantization

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Cybernetics"

DOI: 10.1109/tcyb.2025.3532547

Abstract: This article investigates the asynchronous estimator design for the interval type-2interval type-2 (IT2) fuzzy Markov jump systems subject to dynamic quantization and deception attacks. From the perspective of the attacker, a novel protocol-based deception attackdeception… read more here.

Keywords: deception attacks; based deception; quantization; protocol based ... See more keywords