NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 26,554
1.
  • Deceit on the Road to War Deceit on the Road to War
    Schuessler, John M 11/2015
    eBook

    InDeceit on the Road to War, John M. Schuessler examines how U.S. presidents have deceived the American public about fundamental decisions of war and peace. Deception has been deliberate, he ...
Full text
2.
Full text
3.
  • La Polémique D'une Écriture... La Polémique D'une Écriture au Féminin: La Construction de L'identité Féminine dans les Œuvres Littéraires des Écrivaines Francophones de l'Afrique Subsaharienne
    Kourouma, Kelly Michigan academician, 01/2021, Volume: 48, Issue: 1
    Journal Article
    Peer reviewed

    Qu'est-ce qu'une ecriture feminine ? Existe-t-il une ecriture specifiquement feminine ? (l'écriture a-t-elle un sexe ?) Peut-on parler d'une ecriture africaine veritablement feminine ? Ce probleme du ...
Full text
4.
  • The theory of lie: from the... The theory of lie: from the sophists to socrates
    Nesmeyanov, Evgeny; Petrova, Yulia; Abueva, Nazhavat ... SHS Web of Conferences, 2019, Volume: 72
    Journal Article, Conference Proceeding
    Peer reviewed
    Open access

    The last third of the 20th century and the first decade of the 21st century show the growth of scientific and especially, scientific-promotional papers on the problems of the particularities and ...
Full text

PDF
5.
  • La variété des genres et de... La variété des genres et des styles dans Les Voyageurs de l'Impériale d'Aragon: esquisse d'analyse sociologique
    Aron, Paul Contextes (Liège), 12/2016 18
    Journal Article
    Peer reviewed

    The traditional criticism has rarely considered the style of the great novels of Aragon. It has privileged the thematic and narratological approaches of a corpus itself which is not often covered in ...
Full text
6.
  • How good are we at detectin... How good are we at detecting deception? A review of current techniques and theories
    Tredoux, Colin; Nortje, Alicia South African journal of psychology, 12/2019, Volume: 49, Issue: 4
    Journal Article
    Peer reviewed

    The task of discerning truth from untruth has long interested psychologists; however, methods for doing so accurately remain elusive. In this article, we provide an overview and evaluation of methods ...
Full text
7.
  • Computer-Mediated Deception... Computer-Mediated Deception: Strategies Revealed by Language-Action Cues in Spontaneous Communication
    Ho, Shuyuan Mary; Hancock, Jeffrey T.; Booth, Cheryl ... Journal of management information systems, 01/2016, Volume: 33, Issue: 2
    Journal Article
    Peer reviewed

    Computer-mediated deception threatens the security of online users' private and personal information. Previous research confirms that humans are bad lie detectors, while demonstrating that certain ...
Full text
8.
Full text

PDF
9.
  • Memory-Based Event-Triggeri... Memory-Based Event-Triggering H∞ Load Frequency Control for Power Systems Under Deception Attacks
    Tian, Engang; Peng, Chen IEEE transactions on cybernetics, 11/2020, Volume: 50, Issue: 11
    Journal Article
    Peer reviewed

    This article proposes a memory-based event-triggering <inline-formula> <tex-math notation="LaTeX">H_{\infty } </tex-math></inline-formula> load frequency control (LFC) method for power systems ...
Full text
10.
  • Intelligent deception techn... Intelligent deception techniques against adversarial attack on the industrial system
    Kumari, Suchi; Yadav, Riteshkumar Jayprakash; Namasudra, Suyel ... International journal of intelligent systems, 20/May , Volume: 36, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Community detection algorithms (CDAs) are aiming to group nodes based on their connections and play an essential role in the complex system analysis. However, for privacy reasons, we may want to ...
Full text
1 2 3 4 5
hits: 26,554

Load filters