Frank J. Stech

Learn More
The concepts of deception, counter-deception, and deception detection in the cyber-space domain have been the subject of little systematic analysis. Our objective was to conduct scientometric analyses of these concepts in the cyber-space domain. We observed the following: Although various deceptive tactics are addressed in the cyber-security literature, it(More)
As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense. The Web extra at https://youtu.be/9g_HLNXiLto is a video that describes how in January(More)
In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit:
This paper describes the central component of a system to assist intelligence analysts detect deception. We describe how deceptions exploit cognitive limits and biases and review prior work on processes that can help people recognize organized deceptions. Our process is based on Heuer's Analysis of Competing Hypotheses, which we automate by generating(More)
Image segmentation aims to determine structures of interest inside a digital picture in biomedical sciences. State-of-the art automatic methods however still fail to provide the segmentation quality achievable by humans who employ expert knowledge and use software to mark target structures on an image. Manual segmentation is time-consuming, tedious and(More)