{"id":"https://openalex.org/W2142839685","doi":"https://doi.org/10.1186/s13388-014-0015-3","title":"Belief manipulation and message meaning for protocol analysis","display_name":"Belief manipulation and message meaning for protocol analysis","publication_year":2014,"publication_date":"2014-10-09","ids":{"openalex":"https://openalex.org/W2142839685","doi":"https://doi.org/10.1186/s13388-014-0015-3","mag":"2142839685"},"language":"en","primary_location":{"id":"doi:10.1186/s13388-014-0015-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0015-3","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0015-3","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0015-3","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059954778","display_name":"Aaron Hunter","orcid":"https://orcid.org/0000-0003-4321-4677"},"institutions":[{"id":"https://openalex.org/I174167972","display_name":"British Columbia Institute of Technology","ror":"https://ror.org/01p65pg69","country_code":"CA","type":"education","lineage":["https://openalex.org/I174167972"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Aaron Hunter","raw_affiliation_strings":["British Columbia Institute of Technology, 3700 Willingdon Avenue, Burnaby, Canada","British Columbia Institute of Technology , Burnaby, Canada"],"affiliations":[{"raw_affiliation_string":"British Columbia Institute of Technology, 3700 Willingdon Avenue, Burnaby, Canada","institution_ids":["https://openalex.org/I174167972"]},{"raw_affiliation_string":"British Columbia Institute of Technology , Burnaby, Canada","institution_ids":["https://openalex.org/I174167972"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5059954778"],"corresponding_institution_ids":["https://openalex.org/I174167972"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18083559,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7614001035690308},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7388310432434082},{"id":"https://openalex.org/keywords/meaning","display_name":"Meaning (existential)","score":0.6843744516372681},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5493504405021667},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5196896195411682},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49750736355781555},{"id":"https://openalex.org/keywords/intelligence-analysis","display_name":"Intelligence analysis","score":0.48070579767227173},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.45546281337738037},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.4550011456012726},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3757120668888092},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.31588536500930786},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2061949372291565}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7614001035690308},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7388310432434082},{"id":"https://openalex.org/C2780876879","wikidata":"https://www.wikidata.org/wiki/Q3054749","display_name":"Meaning (existential)","level":2,"score":0.6843744516372681},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5493504405021667},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5196896195411682},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49750736355781555},{"id":"https://openalex.org/C517642484","wikidata":"https://www.wikidata.org/wiki/Q2388514","display_name":"Intelligence analysis","level":2,"score":0.48070579767227173},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.45546281337738037},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.4550011456012726},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3757120668888092},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.31588536500930786},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2061949372291565},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/s13388-014-0015-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0015-3","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0015-3","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/s13388-014-0015-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0015-3","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0015-3","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321453","display_name":"British Columbia Institute of Technology","ror":"https://ror.org/01p65pg69"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2142839685.pdf","grobid_xml":"https://content.openalex.org/works/W2142839685.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W44525949","https://openalex.org/W71860089","https://openalex.org/W181873887","https://openalex.org/W1496314816","https://openalex.org/W1566400168","https://openalex.org/W1576632330","https://openalex.org/W1594099509","https://openalex.org/W1603878273","https://openalex.org/W1633572391","https://openalex.org/W1973309971","https://openalex.org/W1987574012","https://openalex.org/W2003192160","https://openalex.org/W2010939995","https://openalex.org/W2011112377","https://openalex.org/W2016402420","https://openalex.org/W2049129243","https://openalex.org/W2104655005","https://openalex.org/W2111398557","https://openalex.org/W2119081540","https://openalex.org/W2125523641","https://openalex.org/W2127035198","https://openalex.org/W2133126578","https://openalex.org/W2146819619","https://openalex.org/W2146973388","https://openalex.org/W2149420462","https://openalex.org/W2151433956","https://openalex.org/W2222970048","https://openalex.org/W2964305097","https://openalex.org/W3031048092","https://openalex.org/W3140030144","https://openalex.org/W3162919972","https://openalex.org/W4235073904","https://openalex.org/W4246042783","https://openalex.org/W6602676398","https://openalex.org/W6607741573","https://openalex.org/W6635035454","https://openalex.org/W6676667846","https://openalex.org/W6678981298","https://openalex.org/W6688841237"],"related_works":["https://openalex.org/W4296749040","https://openalex.org/W4230197055","https://openalex.org/W621808327","https://openalex.org/W644007644","https://openalex.org/W3012257603","https://openalex.org/W3177475962","https://openalex.org/W4292264782","https://openalex.org/W3016450995","https://openalex.org/W2141646567","https://openalex.org/W2778382471"],"abstract_inverted_index":{"Agents":[0],"often":[1],"try":[2],"to":[3,6,28,33,151,172],"convince":[4],"others":[5],"hold":[7],"certain":[8],"beliefs.":[9],"In":[10,72],"fact,":[11],"many":[12],"network":[13],"security":[14],"attacks":[15],"can":[16,65,95,114,147],"actually":[17,148],"be":[18,96,115,149],"framed":[19],"in":[20,51,104,117,158,196],"terms":[21,118],"of":[22,42,49,60,70,81,92,119,145,155,176,192,199],"a":[23,77,82,93,159],"dishonest":[24],"that":[25,89,111,142],"is":[26,45,163,170],"trying":[27,171],"get":[29],"an":[30,46,156,168,177],"honest":[31,178],"agent":[32,64],"believe":[34],"some":[35],"particular,":[36],"untrue":[37],"claims.":[38],"While":[39],"the":[40,61,68,90,124,130,153,174,190,197],"study":[41],"belief":[43,83,193],"change":[44],"established":[47],"area":[48],"research":[50],"Artificial":[52],"Intelligence,":[53],"there":[54],"has":[55],"been":[56],"comparatively":[57],"little":[58],"exploration":[59],"way":[62],"one":[63],"explicitly":[66],"manipulate":[67,173],"beliefs":[69,175],"another.":[71],"this":[73,143],"paper,":[74],"we":[75,109],"introduce":[76],"precise,":[78],"formal":[79],"notion":[80],"manipulation":[84,194],"problem.":[85],"We":[86,140,188],"also":[87],"illustrate":[88],"meaning":[91],"message":[94,113,131],"parsed":[97],"into":[98],"different":[99],"communicative":[100],"acts,":[101],"as":[102],"defined":[103],"discourse":[105],"analysis":[106],"theory.":[107],"Specifically,":[108],"suggest":[110],"each":[112],"understood":[116],"what":[120,126,134],"it":[121,127,135],"says":[122,128,136],"about":[123,129,137],"world,":[125],"history,":[132],"and":[133],"future":[138,186],"actions.":[139],"demonstrate":[141],"kind":[144],"dissection":[146],"used":[150],"discover":[152],"goals":[154],"intruder":[157],"communication":[160],"session,":[161],"which":[162],"important":[164],"when":[165],"determining":[166],"how":[167],"adversary":[169],"agent.":[179],"This":[180],"information":[181],"will":[182],"then":[183],"help":[184],"prevent":[185],"attacks.":[187],"frame":[189],"discussion":[191],"primarily":[195],"context":[198],"cryptographic":[200],"protocol":[201],"analysis.":[202]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
