2001
DOI: 10.1007/3-540-44566-8_27
|View full text |Cite
|
Sign up to set email alerts
|

Ascribing and Weighting Beliefs in Deceptive Information Exchanges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2002
2002
2014
2014

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…In artificial intelligence, there have been studies specifically concerned with deception. Modelling suspicion in such a society of agents that deception may occur in it, is the subject of [15,16,31]. Sergot [103] is concerned with modelling unreliable and untrustworthy agent behaviour.…”
Section: The Auranzeb Project Under the Plotinus Umbrellamentioning
confidence: 99%
“…In artificial intelligence, there have been studies specifically concerned with deception. Modelling suspicion in such a society of agents that deception may occur in it, is the subject of [15,16,31]. Sergot [103] is concerned with modelling unreliable and untrustworthy agent behaviour.…”
Section: The Auranzeb Project Under the Plotinus Umbrellamentioning
confidence: 99%
“…McKenzie and colleagues [17] discuss the potential benefits of deceptive agents as training partners that help the user to recognize malicious intent, but do not present any implementation. Castelfranchi and Poggi [5] developed a theory of deception in communication which has grounded prototyping of a deception modeling tool in which both the deceiver and the receiver of the message are modeled [3,6]. The issue of deception has also been addressed in the area of conversational systems [15] and in the area of multi-agent systems where different strategies of deception and their effects on the interaction of agents are explored [4,28].…”
Section: Introductionmentioning
confidence: 99%
“…If A has not dealt with D before, or A has not dealt with D in regard to either O or C, A must estimate probabilities. [9] notes this in modeling deception and tries a different approach, but we do not see this is necessary since one can use the results of a running intrusion-detection system if enough data has been collected about a user, and otherwise "statistical inheritance" with known marginal statistics on generalizations D' of D, O' of O, and C' of C. If there is more than one such D', O', or C' we need to take a weighted average of their predictions, where typically the weight is the inverse of the corresponding set size (the number of things in the real world to which the class corresponds, since larger classes are further in properties from the target class). Such reasoning can be fallacious, as for instance when we have had one bad experience with a Microsoft product and we generalize to all Microsoft products, or when we have had one bad experience with a person of one ethnic group and we generalize to all members of that group.…”
Section: The Strength Of Attacker Hypothesesmentioning
confidence: 99%
“…[10] and [19] provide ideas for modeling attacks on computer systems, the former suggesting some interesting ideas about deception in defense. Work on multi-agent systems is starting to examine societies of deceptive agents [3,9,30]. [4] identifies six basic methods of deception: masking, repackaging, dazzling, mimicking, inventing, and decoying.…”
Section: Introductionmentioning
confidence: 99%