Frank J. Stech

Learn More
The concepts of deception, counter-deception, and deception detection in the cyber-space domain have been the subject of little systematic analysis. Our objective was to conduct scientometric analyses of these concepts in the cyber-space domain. We observed the following: Although various deceptive tactics are addressed in the cyber-security literature, it(More)
In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit:
As attack techniques evolve, cybersystems must also evolve to provide the best continuous defense. Leveraging classical denial and deception techniques to understand the specifics of adversary attacks enables an organization to build an active, threat-based cyber defense. The Web extra at https://youtu.be/9g_HLNXiLto is a video that describes how in January(More)
Historical accounts of military deception abound, but there are few historical accounts of counter-deception, and fewer operational theories. This paper describes a business process and semi-automated tools for detecting deception. Our prototype counter-deception business process starts with hypothesis generation. For tactical situations, this consists of(More)
Image segmentation aims to determine structures of interest inside a digital picture in biomedical sciences. State-of-the art automatic methods however still fail to provide the segmentation quality achievable by humans who employ expert knowledge and use software to mark target structures on an image. Manual segmentation is time-consuming, tedious and(More)