Spy the lie: Detecting malicious insiders
CF Noonan - 2018 - osti.gov
Insider threat is a hard problem. There is no ground truth, there are innumerable variables,
and the data is sparse. The types of crimes and abuses associated with insider threats are …
and the data is sparse. The types of crimes and abuses associated with insider threats are …
Domain-independent deception: Definition, taxonomy and the linguistic cues debate
Internet-based economies and societies are drowning in deceptive attacks. These attacks
take many forms, such as fake news, phishing, and job scams, which we call" domains of …
take many forms, such as fake news, phishing, and job scams, which we call" domains of …
[HTML][HTML] Deception detection in conversations using the proximity of linguistic markers
Detecting the elements of deception in a conversation takes years of study and experience,
and it is a skill set primarily used in law-enforcement agencies. In ever-growing business …
and it is a skill set primarily used in law-enforcement agencies. In ever-growing business …
Text sophistication and sophisticated investors
We show that two novel measures of text sophistication, applied to hedge fund strategy
descriptions, encapsulate incremental information about funds. Consistent with the …
descriptions, encapsulate incremental information about funds. Consistent with the …
[PDF][PDF] Nervosité lors du mensonge à l'écrit: croyances, charge cognitive, et modèles de production linguistiques
PM Ginet-Rapporteur, PT Olive-Rapporteur… - theses.fr
Résumé Cette thèse a évalué la nervosité lors du mensonge par l'analyse du discours. Le
grand-public et les policiers adoptent souvent des croyances incorrectes quant au …
grand-public et les policiers adoptent souvent des croyances incorrectes quant au …
[PDF][PDF] TECHNOLOGY JOURNAL
S GLLGGGGGG - Information Technology Journal, 2007 - academia.edu
Soundness and coercion resistance are the important and intricate security requirements for
remote voting protocols. In this study firstly the review of the formal methods of security …
remote voting protocols. In this study firstly the review of the formal methods of security …
[引用][C] РЕЧЕВЫЕ ПРИЗНАКИ НАЛИЧИЯ НЕИСКРЕННОСТИ В ВЫСКАЗЫВАНИЯХ, ПЕРЕДАВАЕМЫХ С ПОМОЩЬЮ ИНТЕРНЕТ-ТЕЛЕФОНИИ SKYPE
ОВ Лыкова - 2019 - elibrary.ru