Showing 61 - 80 results of 190 for search '"deception"', query time: 0.04s Refine Results
  1. 61
  2. 62
  3. 63

    Introduction by Monique DE MATTIA-VIVIES

    Published 2019-12-01
    Subjects:
    Get full text
    Article
  4. 64
  5. 65
  6. 66
  7. 67

    Characteristic Parameter Optimization of Wireless Flaw Sensing System Based on Active Interference Suppression Algorithm by Wenping Wu

    Published 2021-01-01
    “…Secondly, for the detection of chirp active deception jamming signals entering from the main lobe, a radar active deception jamming detection method based on the characteristic parameter matching of the harmonic components of active deception jamming signals is proposed. …”
    Get full text
    Article
  8. 68

    AntiGPS spoofing method for UAV based on LSTM-KF model by Yang SUN, Chunjie CAO, Junxiao LAI, Tianjiao YU

    Published 2020-10-01
    “…A detection method of anti GPS deception of UAV was proposed for the problem that GPS signal of UAV was easy to be interfered and deceived,which combined deep learning and Kalman filter.The dynamic model of UAV flight was predicted from the flight state of UAV by using long short-term memory network,and the dynamic adjustment of Kalman filter and dynamic model was used to identify GPS deception.In order to resist the interference of GPS deception signal,this method did not need to increase the hardware overhead of the receiver,and was easy to realize.The experimental results show that the method has higher accuracy and lower false alarm rate for the recognition of GPS signals,and can effectively enhance the UAV's ability to resist GPS deception interference.…”
    Get full text
    Article
  9. 69

    Cleptobiosis in Social Insects by Michael D. Breed, Chelsea Cook, Michelle O. Krasnec

    Published 2012-01-01
    “…Cleptobionts can succeed by deception or by force, and we review the literature on cleptobiosis by deception or force in social insects. …”
    Get full text
    Article
  10. 70

    “Looking on darkness which the blind do see”: the Figure of the Blind Girl in Dickens and the Dickensian by Francesca ORESTANO

    Published 2016-06-01
    “…The article focuses on the theme of blindness in Dickens’s American Notes (1842) and in The Cricket on the Hearth (1845): sight impairment is treated as a vehicle to carry the reader from landscape to inscape, staging at once truth and deception, blindness and insight. Such dramatic irony is also the leitmotif of Wilkie Collins’s Poor Miss Finch (1872) and is fully acknowledged in André Gide’s La Symphonie pastorale (1919). …”
    Get full text
    Article
  11. 71

    Observer-Based PID Security Control for Discrete-Time T-S Fuzzy Systems under Distributed Dynamic Event-Triggered Mechanism by Sisi Lin, Mengzhuo Luo, Shouming Zhong, Kaibo Shi, Xingxu Tan

    Published 2022-01-01
    “…This study addresses the observer-based proportional-integral-derivative (PID) security control problem for nonlinear discrete-time fuzzy systems subject to deception attacks. In order to reduce the burden of communication, a distributed dynamic event-triggered mechanism (DETM) is proposed, and each sensor node is equipped with an event-trigger generator. …”
    Get full text
    Article
  12. 72

    Strategy of container migration and honeypot deployment based on signal game in cloud environment by Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU

    Published 2022-06-01
    “…Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.…”
    Get full text
    Article
  13. 73

    Blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics by Chuntang YU, Zhigeng HAN, Zhiyuan LI, Liangmin WANG

    Published 2020-06-01
    “…In view of the security threats such as forgery,deception,privacy disclosure and non-traceability caused by the lack of transaction supervision for crowdsourcing logistics in the modern service industry,a blockchain-based hierarchical and multi-level smart service transaction supervision framework for crowdsourcing logistics was proposed.Firstly,the framework adopted the two-stage supervision system:one was the National Authorized Certification Center for the supervision of logistics service platform,the other was the logistics service platform for the supervision of crowdsourcing logistics participation.Later,under the framework of the supervision system,the functions of crowd contract,legal and anonymous identity authentication,intelligent transaction matching,anomaly data analysis and detection,privacy protection and traceability were realized.Then,through the security analysis and transaction supervision component software,the security controllability and operational efficiency of the transaction supervision architecture were verified.Finally,the software component was run on the real crowdsourcing logistics enterprise platform for the actual measurement.The measurement results show that the proposed hierarchical and multi-level smart service transaction supervision framework is safe and controllable.The framework can protect the privacy of users and data,prevent forgery and deception,and realize the auditability and traceability of behaviors and data of users.…”
    Get full text
    Article
  14. 74

    Strategic insights into penalty kick execution: A comprehensive analysis of observable behaviors in the German Bundesliga by Pascal Feber, Guilherme Pinheiro

    Published 2024-06-01
    “…Through analysis of the kicker's running pattern, deception actions, gaze behavior, and kicking technique, football practitioners may attempt to determine the kicker's favored approach, and ultimately the penalty kick strategy, so they can inform coaching staff and players.…”
    Get full text
    Article
  15. 75

    True or False? Defining the Fake in Chinese Porcelain by Stacey Pierson

    Published 2019-06-01
    “…This is falsifying for profit. However, deception can also be a form of aesthetics or even a necessity. …”
    Get full text
    Article
  16. 76

    Archéologies révolutionnaires. Regards croisés sur la Tunisie et l’Égypte (2011-2013) by Guillaume Mazeau, Giedre Sabaseviciute

    Published 2014-07-01
    “…Constantly alternating between urgency and expectation, enthusiasm and deception, certainty and doubt, these events have deeply impacted the rhythms of life and perceptions of history. …”
    Get full text
    Article
  17. 77

    Some New Constructions of Authentication Codes with Arbitration and Multi-Receiver from Singular Symplectic Geometry by You Gao, Huafeng Yu

    Published 2011-01-01
    “…Assuming that the encoding rules are chosen according to a uniform probability distribution, the probabilities of success for different types of deception are also computed.…”
    Get full text
    Article
  18. 78

    Peculiarities of the investigation of frauds disguised as civil legal relations by K. D. Zaiats, D. D. Zaiats

    Published 2023-07-01
    “…It has been noted that the courts recognize as a legal basis for the detention of a person suspected of committing fraud, only collected evidence of the use of deception or abuse of trust during the acquisition of property or the right to it. …”
    Get full text
    Article
  19. 79

    A security authentication scheme in RFID system for smart park by Rongrong LI, Jiantao KOU, Gang DONG, Liangrui TANG

    Published 2016-02-01
    “…The new protocol could effectively resist attacks of re-transmission,tracking,deception,cloning and de-synchronizationand,and it had high security and practicability.…”
    Get full text
    Article
  20. 80

    Une copie de L’Origine du monde par René Magritte ? by Catherine Defeyt, David Strivay

    Published 2019-12-01
    “…For more than 20 years, the copy of The origin of the world of Courbet, which Joseph-Marie Lo Duca attributed to René Magritte, has duped historians and amateurs. Although the deception was unmasked, the date of realization, the context of realization and the author of this copy remained unknown. …”
    Get full text
    Article