AU Library
AUL Home
Research Tools
Search Home
Password Access
Academic Journals
AU Research
> Student Papers
AULIMP
Professional Reading Lists
Databases
Digital Archives
Ebooks, Magazines
Innovation Lab
Maps
Research Guides
School Support
Canvas (Enterprise)
ACSC
AF Fellows
AUL Gunter
AWC
Blue Horizons
Chaplain Corps
Distance Learner Links
EPME
GCPME
IOS
OTS
SAASS
SOS
Services
Faculty and Customers
Gunter Pickup
Innovation Lab
InterLibrary Loan
Research Specialists
Reserve a Room
Reserve Technology
School Liaisons
Suggest a Purchase
Writing Lab Tutors
News & Events
Event Calendar
Fairchild Installment News
News
Help
About
Ask a Librarian
Contact
FAQs
Hours
Password Access
Air University Library
AUL LibGuides
Subject Research Guide Archives
Military Deception
Electronic Resources
Search this Guide
Search
Print Page
Military Deception: Electronic Resources
March 2020
Home
AU Research
Books and Documents
Journals and Articles
Databases
Websites
Electronic Resources
Electronic Resources
Game Theory for Adaptive Defensive Cyber Deception
by Kimberly Ferguson-Walter and others.
San Diego, CA, Space and Naval Warfare Systems Center Pacific, July 2018. 22 p.
Deception Using an SSH Honeypot
by Ryan J. McCaughey.
Monterey, CA, Naval Postgraduate School, September 2017. 83 p.
Monitoring Social Media: Lessons for Future Department of Defense Social Media Analysis in Support of Information Operations
by William Marcellino and others.
Santa Monica, CA, RAND, 2017. 75 p.
A Little Masquerade: Russia's Evolving Employment of Maskirovka
by Morgan Maier.
Fort Leavenworth, KS, U.S. Army Command and General Staff College, April 2016. 61 p.
The Misplaced Ruse: Strategic Military Deception as a Tool in Low-Intensity Conflict
by Christofer B. O'Keefe.
Washington, National Defense University, 2016. 60 p.
Surprise, Deception, Denial and Warning: Strategic Imperatives
by Lani Kass and J. Philip London.
Orbis
57, no. 1:59-82 Winter 2013.
Influence: Theory and Practice
by William G. Hansen.
Monterey, CA, Naval Postgraduate School, June 2013. 305 p.
Deception: Theory and Practice
by James D. Monroe.
Monterey, CA, Naval Postgraduate School, June 2012. 153 p.
Deception Detection in Multicultural Coalitions: Foundations for a Cognitive Model
by Joan Kaina and others.
San Diego, CA, Space and Naval Warfare (SPAWAR) System Center (SSC) Pacific, June 2011. 35 p.
Re-Integrating Influence and Cyber Operations
by Dennis J. Krill.
Wright-Patterson Air Force Base, OH, Air Force Institute of Technology, 2011. 67 p.
Reasons for Secrecy and Deception in Homeland-Security Resource Allocation
by Jun Zhuang and Vicki M. Bier.
Risk Analysis: An International Journal
30, no. 12:1737-1743 December 2010.
Social Networking Services: The New Influence Frontier
by James M. Efaw.
IO Sphere
pp 4-7 Winter 2009.
Contributions of Honeypots to Network Security
by P.V. Chandra Sagar.
Linkoping, Sweden, Linkoping University, 2007. 33 p.
Deception in Defense of Computer Systems from Cyber-Attack
by Neil C. Rowe.
Monterey, CA, Naval Postgraduate School, 2007. 6 p.
A Taxonomy of Deception in Cyberspace
by Neil C. Rowe.
Monterey, CA, Naval Postgraduate School, March 2006. 9 p.
Maintaining Credibility Within Public Affairs While Preserving and Participating in Military Deception
by Rudy Hernandez and others.
DOD Short Course in Communications, University of Oklahoma, Norman, OK.
<<
Previous:
Websites
Accessibility/Section 508