Login / Signup
Deception in cyberspace: An empirical study on a con man attack.
Md Minhaz Chowdhury
Kendall E. Nygard
Published in:
EIT (2017)
Keyphrases
</>
malicious attacks
countermeasures
machine learning
mental states
detection mechanism
decision trees
attack detection
deception detection
real time
key exchange protocol
malicious users
power analysis
digital world
ddos attacks
incomplete information
bayesian networks
information systems