<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-3108</journal-id>
<journal-title><![CDATA[Revista Criminalidad]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Crim.]]></abbrev-journal-title>
<issn>1794-3108</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-31082018000200075</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas]]></article-title>
<article-title xml:lang="en"><![CDATA[Instruments, measures, procedures and background of studies produced for deceit detection by using psycho-physiological actions]]></article-title>
<article-title xml:lang="pt"><![CDATA[Instrumentos, medidas, procedimentos e procedência dos estudos produzidos para a detecção de engano por meio de medidas psicofisiológicas]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Builes]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gutiérrez de Piñeres]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad Católica de Colombia  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad Católica de Colombia  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2018</year>
</pub-date>
<volume>60</volume>
<numero>2</numero>
<fpage>75</fpage>
<lpage>88</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-31082018000200075&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-31082018000200075&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-31082018000200075&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Esta investigación tuvo como objetivo identificar los instrumentos, medidas, procedimientos y procedencia de los estudios producidos para la detección del engaño a través de medidas psicofisiológicas en los últimos 5 años (2011-2016). Para ello se procedió a realizar una revisión de literatura en diferentes bases de datos, ejecutando un análisis descriptivo de datos conforme a las categorías generadas para este fin. Se apreció que el electroencefalograma y la resonancia magnética funcional han empezado a utilizarse para tal fin, siendo el primero el más frecuentemente empleado. El procedimiento de potenciales relacionados con eventos, es el más utilizado actualmente para la detección del engaño en el campo de la psicofisiología. No se hallaron estudios realizados en países de habla hispana y se identifica a Estados Unidos, China e Inglaterra como los principales generadores de conocimiento en este campo. Los estudios actuales muestran un énfasis en conocer los procesos cerebrales que se producen al momento de engañar. No obstante, estos avances también abren un debate ético sobre las implicaciones frente a la libertad humana y a la no autoincriminación.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This investigation aimed to identify the instruments, measures, procedures and background of studies produced for deceit detection by using psychophysiological actions in the last five years (2011- 2016). To this end, a literature review was compiled from different databases by running a descriptive data analysis according to the categories generated for this intention. It was noticed that electroencephalogram (EEG) and functional magnetic resonance (fMRI) have begun to be used for this purpose with EEG as the most frequent. The procedure of potentials related to events is currently the most used for the deceit detection in the psycho-physiology field. No studies were found in Spanish speaking countries. The United States, China and England were identified as the main source of information in this field. Recent studies show an increase in understanding the brain processes produced at the time of deceiving. Nevertheless, these studies spark an ethical debate about the implications with respect to human freedom and self-incrimination.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Esta pesquisa teve como objetivo identificar os instrumentos, medidas, procedimentos e procedencia dos estudos produzidos para a detecção do engano por meio de medidas psicofisiológicas nos últimos cinco anos (2011-2016). Procedeu-se à realização de uma revisão da literatura em diferentes bases de dados, executando uma análise descritiva dos dados conforme as categorias geradas para esse propósito. Identificou-se que o encefalograma e a ressonância magnética funcional têm começado a ser utilizados e que o primeiro é empregado com maior frequência. O procedimento de potenciais relacionados com eventos é o mais usado atualmente para a detecção do engano no campo da psicofisiologia. Não foram localizados estudos desenvolvidos em países de fala hispana e os Estados Unidos, a China e a Inglaterra foram reconhecidos como os principais países geradores de conhecimento nesse campo. Os estudos atuais mostram uma ênfase em conhecer os procesos cerebrais que são produzidos no momento de enganar. Porém, esses avanços também abrem um debate ético sobre as implicações relacionadas à liberdade humana e à não autoincriminação.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Falso testimonio]]></kwd>
<kwd lng="es"><![CDATA[psicología]]></kwd>
<kwd lng="es"><![CDATA[psicología criminal]]></kwd>
<kwd lng="es"><![CDATA[diagnóstico psicológico]]></kwd>
<kwd lng="es"><![CDATA[pericia psicológica]]></kwd>
<kwd lng="en"><![CDATA[False testimony]]></kwd>
<kwd lng="en"><![CDATA[psychology]]></kwd>
<kwd lng="en"><![CDATA[criminal psychology]]></kwd>
<kwd lng="en"><![CDATA[psychological diagnostic]]></kwd>
<kwd lng="en"><![CDATA[psychological expertise]]></kwd>
<kwd lng="pt"><![CDATA[Testemunho falso]]></kwd>
<kwd lng="pt"><![CDATA[Psicologia]]></kwd>
<kwd lng="pt"><![CDATA[Psicologia Criminal]]></kwd>
<kwd lng="pt"><![CDATA[diagnóstico psicológico]]></kwd>
<kwd lng="pt"><![CDATA[perícia psicológica]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ben-Shakhar]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of questions repetition and variation on the efficiency of the guilty knowledge test: A reexamination]]></article-title>
<source><![CDATA[Journal of applied]]></source>
<year>2002</year>
<volume>87</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>972-7</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ben-Shakhar]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Gronau]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Leakage of relevant information to innocent examinees in the GKT: An attempt to reduce false-positive outcomes by introducing target stimuli]]></article-title>
<source><![CDATA[Journal of applied psychology]]></source>
<year>1999</year>
<volume>84</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>651-60</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bowman]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Filetti]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alsufyani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Janssen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2014</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bradley]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Maclaren]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Carle]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deception and no deception in guilty knowledge and guilty actions polygraph tests]]></article-title>
<source><![CDATA[Journal of applied psychology]]></source>
<year>1996</year>
<volume>81</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>153-60</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Breska]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zaindenberg.]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Gronau]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ben-Shakhar]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Psychophysiological Detection of Concealed Information Shared by Groups: An Empirical Study of the Searching CIT]]></article-title>
<source><![CDATA[Journal of experimental psychology: Applied]]></source>
<year>2014</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>136-46</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carmel]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Dayan]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Naveh]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Raveh]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Ben-shakhar]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estimating the Validity of the Guilty Knowledge Test From Simulated Experiments: The External Validity of Mock Crime Studies]]></article-title>
<source><![CDATA[Journal of experimental psychology applied]]></source>
<year>2003</year>
<volume>9</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>261-9</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<collab>Centro Cochrane Iberoamericano</collab>
<article-title xml:lang=""><![CDATA[Manual Cochrane de Revisiones Sistemáticas de Intervenciones]]></article-title>
<source><![CDATA[]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Centro Cochrane Iberoamericano]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Xue]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yiang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mei]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Specific marker of feigned memory impairment: The activation of left superior frontal gyrus]]></article-title>
<source><![CDATA[Journal of forensic and legal medicine]]></source>
<year>2015</year>
<volume>36</volume>
<page-range>164-71</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<collab>Asamblea Nacional Constituyente</collab>
<article-title xml:lang=""><![CDATA[Constitución Política de Colombia]]></article-title>
<source><![CDATA[]]></source>
<year>1991</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cook]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hacker]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Webb]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Osher]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kristjansson]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lyin eyes: Ocular-motor measures of reading reveal deception]]></article-title>
<source><![CDATA[Journal of experimental psychology]]></source>
<year>2012</year>
<volume>18</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>301-13</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Csaba]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The influence of stimulation/accomodation tests for the polygraph examination economy]]></article-title>
<source><![CDATA[Forensic science]]></source>
<year>2013</year>
<volume>14</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1404-10</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dietrich]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Effects of Sweep Numbers Per Average and Protocol Type on the Accuracy of the P300-Based Concealed Information Test]]></article-title>
<source><![CDATA[Applied Phycophysiology biofeedback]]></source>
<year>2014</year>
<volume>39</volume>
<page-range>67-73</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Sai]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neural correlates of second-order verbal deception: A functional near-infrared spectroscopy (fnirs) study]]></article-title>
<source><![CDATA[Neuroimage]]></source>
<year>2014</year>
<volume>87</volume>
<numero>505-514</numero>
<issue>505-514</issue>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ebrahimzadeh]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Alavi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bijar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pakkeshal]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel approach for detection of deception using Smoothed Pseudo Wigner-Ville Distribution]]></article-title>
<source><![CDATA[Journal biomedical science and engineering]]></source>
<year>2013</year>
<volume>6</volume>
<page-range>8-18</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of Incomplete Information on the Detection of Concealed Crime Details]]></article-title>
<source><![CDATA[Applied Phycophysiology biofeedback]]></source>
<year>2011</year>
<volume>36</volume>
<page-range>159-71</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ginton]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jungman]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detection measures in real life criminal guilty knowledge tests]]></article-title>
<source><![CDATA[Journal of applied psychology]]></source>
<year>1992</year>
<volume>77</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>757-67</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Reizer]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Personality Correlates of the Self-Assessed Abilities to Tell and Detect Lies, Tell Truths, and Believe Others]]></article-title>
<source><![CDATA[Journal of Individual Differences]]></source>
<year>2015</year>
<volume>36</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>163-9</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Sommerfeld]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Effects of Guilt, Disbelief, and Assessed]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<article-title xml:lang=""><![CDATA[Lie-Truth Telling Abilities on Physiological Responses in the Guilty Action Test]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<volume>7</volume>
<page-range>1075-91</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farahani]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Moradi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Concealed Information Test with Combination of ERP Recording and Autonomic Measurements]]></article-title>
<source><![CDATA[Neurophysiology]]></source>
<year>2013</year>
<volume>45</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>223-33</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gamer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Klimecki]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Bauermann]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Stoeter]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Vossel]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[fMRI-activation patterns in the detection of concealed information rely on memory-related effects]]></article-title>
<source><![CDATA[Scan]]></source>
<year>2012</year>
<volume>7</volume>
<page-range>506-15</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ganis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Meixner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kievit]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Schendan]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging]]></article-title>
<source><![CDATA[Neuroimage]]></source>
<year>2011</year>
<volume>55</volume>
<page-range>312-9</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel algorithm to enhance p300 in single trials: Application to lie detection using F-score and SVM]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2014</year>
<volume>9</volume>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Tao]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Guan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Novel Approach for Lie Detection Based on F-Score and Extreme Learning Machine]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2013</year>
<volume>8</volume>
<numero>6</numero>
<issue>6</issue>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hadar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Makris]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yarrow]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The truth-telling motor cortex: Response competition in M1 discloses deceptive behaviour]]></article-title>
<source><![CDATA[Biological Psychology]]></source>
<year>2012</year>
<volume>89</volume>
<numero>495-502</numero>
<issue>495-502</issue>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Honts]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Reavy]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The comparison question polygraph test: A contrast of methods and scoring]]></article-title>
<source><![CDATA[Physiology and behavior]]></source>
<year>2015</year>
<volume>143</volume>
<page-range>15-26</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Honts]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodes]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Raskin]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of physical countermeasures on the physiological detection of deception]]></article-title>
<source><![CDATA[Journal of applied psychology]]></source>
<year>1985</year>
<volume>70</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>177-87</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Pornpattananangkul]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nusslock]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Executive control- and reward-related neural processes associated with the opportunity to engage in voluntary dishonest moral decision making]]></article-title>
<source><![CDATA[Cognitive affective, behavior neuroscience]]></source>
<year>2015</year>
<volume>15</volume>
<page-range>475-91</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Isaychev]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Edrenkin]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Chernorizov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Isaychev]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Event related potentials in deception detection]]></article-title>
<source><![CDATA[Psychology in Russia]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ito]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Abe]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Fujii]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ueno]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Koseki]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Hashimoto]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mugikura]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Takahashi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mori]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of the dorsolateral prefrontal cortex in deception when remembering neutral and emotional events]]></article-title>
<source><![CDATA[Neuroscience Research]]></source>
<year>2011</year>
<volume>69</volume>
<page-range>121-8</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Junfeng]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jianhui]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Wenjia]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yong]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Feature Optimize and Classification of EEG Signals: Application to Lie Detection Using KPCA and ELM]]></article-title>
<source><![CDATA[Sensors and transducers]]></source>
<year>2014</year>
<volume>169</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>235-40</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Frontoparietal activity during deceptive responses in the P300-based guilty knowledge test:An sLORETA study]]></article-title>
<source><![CDATA[Neuroimage]]></source>
<year>2013</year>
<volume>78</volume>
<page-range>305-15</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kircher]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Raskin]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human versus computerized evaluations of poligraph data in a laboratory setting]]></article-title>
<source><![CDATA[Journal of applied psychology]]></source>
<year>1988</year>
<volume>73</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>291-302</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kosheleva]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Spadoni]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Strigo]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchsbaum]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Simmons]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Faking bad: The neural correlates of feigning memory impairment]]></article-title>
<source><![CDATA[Neuropsychology]]></source>
<year>2016</year>
<volume>30</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>377-84</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lykken]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detection of Guilty Knowledge: A Comment on Forman and McCauley]]></article-title>
<source><![CDATA[Journal of Applied Psychology]]></source>
<year>1988</year>
<volume>73</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>303-4</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marchak]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting false intent using eye blink measures]]></article-title>
<source><![CDATA[Frontiers in psychology]]></source>
<year>2013</year>
<volume>736</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meixner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Labkovsky]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Winograd]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sokolovsky]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Weishaar]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullmann]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Putative Novel ERP Component that Indexes Countermeasure Use in the P300-Based Concealed Information Test]]></article-title>
<source><![CDATA[Applied psychophysiology biofeedback]]></source>
<year>2013</year>
<volume>38</volume>
<page-range>121-32</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pasca]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Study regarding psychophysiological reactivity values depending on subject&#8217;s gender in polygraph testing]]></article-title>
<source><![CDATA[Social and Behavioral Sciences]]></source>
<year>2011</year>
<volume>33</volume>
<page-range>821-5</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peth]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Emotional modulation of memory enconding and retrieval in the concealed Information Test]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Berlín ]]></publisher-loc>
<publisher-name><![CDATA[UNIVERSITÄTSKLINIKUM HAMBURG-EPPENDORF]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peth]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sommer]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hebart]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vossel]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Büchel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Gamer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Memory detection using fmri -Does the enconding context matter]]></article-title>
<source><![CDATA[Neuroimage]]></source>
<year>2015</year>
<volume>113</volume>
<numero>164-174</numero>
<issue>164-174</issue>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ward]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Frigo]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Drapekin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Labkovsky]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection]]></article-title>
<source><![CDATA[Journal of Psychophysiology]]></source>
<year>2015</year>
<volume>96</volume>
<page-range>16-22</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ward]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Thai]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Labokovsky]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Superiority of Pictorial Versus Verbal Presentation and Initial Exposure in the P300-Based]]></source>
<year>2015</year>
<publisher-name><![CDATA[Complex Trial Protocol]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<article-title xml:lang=""><![CDATA[for Concealed Memory Detection]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<volume>40</volume>
<page-range>61-73</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sai]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sang]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting Concealed Information Using Functional Near-Infrared Spectroscopy]]></article-title>
<source><![CDATA[Brain Topography]]></source>
<year>2014</year>
<volume>27</volume>
<page-range>652-62</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schwedes]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wentura]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The revealing glance: Eye gaze behavior to concealed information]]></article-title>
<source><![CDATA[Memory cognition]]></source>
<year>2012</year>
<volume>40</volume>
<page-range>642-51</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sip]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Carmel]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Marchant]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Petrovic]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Roestorpff]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[MgGregor]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Frith]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[When Pinocchio&#8217;s nose does not grow: belief regarding lie-detectability modulates production of deception]]></article-title>
<source><![CDATA[Frontiers in human neuroscience]]></source>
<year>2013</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sowdwen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Banissy]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Catmur]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Bird]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Transcranial Current Stimulation of the Temporoparietal Junction Improves Lie Detection]]></article-title>
<source><![CDATA[Current biology]]></source>
<year>2015</year>
<volume>25</volume>
<page-range>2447-51</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Staunton]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hammond]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Investigation of the Guilty Knowledge Test Polygraph Examination]]></article-title>
<source><![CDATA[Journal of criminal psychology]]></source>
<year>2011</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ströfer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Noordzi.]]></surname>
<given-names><![CDATA[j.]]></given-names>
</name>
<name>
<surname><![CDATA[Ufkes]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Giebels]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated?]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2015</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tomash]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Reed]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using conditioning to elicit skin conductance responses to deception]]></article-title>
<source><![CDATA[Learning and Motivation]]></source>
<year>2015</year>
<volume>49</volume>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vartanian]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwantes]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mandel]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lying in the scanner: Localized inhibition predicts lying skill]]></article-title>
<source><![CDATA[Neuroscience Letters]]></source>
<year>2012</year>
<volume>529</volume>
<page-range>18-22</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Visu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bus]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Miclea]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting concealed information from a mock crime scenario by using psychophysiological and RT-based measures. Cognition, Brain, Behavior]]></article-title>
<source><![CDATA[An Interdisciplinary Journal]]></source>
<year>2011</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>19-37</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walczyk]]></surname>
<given-names><![CDATA[J.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Grifth]]></surname>
<given-names><![CDATA[D.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Yates]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Visconte]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Simoneaux]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Eye movements and other cognitive cues to rehearsed and unrehearsed deception when interrogated about a mock crime]]></article-title>
<source><![CDATA[Applied Psychology in Criminal Justice]]></source>
<year>2013</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Functional brain network and multichannel analysis for the P300-based brain computer interface system of lying detection]]></article-title>
<source><![CDATA[Expert Systems With Applications]]></source>
<year>2016</year>
<volume>53</volume>
<page-range>117-28</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A New Approach for Concealed Information Identification Based on ERP Assessment]]></article-title>
<source><![CDATA[J Med Syst]]></source>
<year>2012</year>
<volume>36</volume>
<page-range>2401-9</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zvi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Nachson]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of coping and cooperative instructions on guilty and informed innocents' physiological responses to concealed information]]></article-title>
<source><![CDATA[]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bowman]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Filetti]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alsufyani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Janssen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[Countering Countermeasures: Detecting Identity Lies by Detecting Conscious Breakthrough]]></source>
<year>2014</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
<publisher-name><![CDATA[PLoS ONE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bowman]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Fileti]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Janssen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Su]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Alsufyani]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Wyble]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Subliminal Salience Search Illustrated: EEG Identity and Deception Detection on the Fringe of Awareness]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2013</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Breska]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zaindenberg.]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Gronau]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ben-Shakhar]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychophysiological Detection of Concealed Information Shared by]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="">
<collab>Groups: An Empirical Study of the Searching CIT</collab>
<source><![CDATA[]]></source>
<year></year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>136-46</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Xue]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yiang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mei]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Specific marker of feigned memory impairment: The activation of left superior frontal gyrus]]></article-title>
<source><![CDATA[Journal of forensic and legal medicine]]></source>
<year>2015</year>
<volume>36</volume>
<page-range>164-71</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cook]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hacker]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Webb]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Osher]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kristjansson]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lyin eyes: Ocular-motor measures of reading reveal deception]]></article-title>
<source><![CDATA[Journal of experimental psychology]]></source>
<year>2012</year>
<volume>18</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>301-13</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Csaba]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The influence of stimulation/accomodation tests for the polygraph examination economy]]></article-title>
<source><![CDATA[Forensic science]]></source>
<year>2013</year>
<volume>14</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1404-10</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dietrich]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Effects of Sweep Numbers Per Average and Protocol Type on the Accuracy of the P300-Based Concealed Information Test]]></article-title>
<source><![CDATA[Applied Phycophysiology biofeedback]]></source>
<year>2014</year>
<volume>39</volume>
<page-range>67-73</page-range></nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Du]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
<name>
<surname><![CDATA[Lei]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Neural Correlates of Identity Faking and Concealment: An fMRI Study]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2012</year>
<volume>7</volume>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neural correlates of spontaneous deception: A functional near- infrared spectroscopy (fNIRS) study]]></article-title>
<source><![CDATA[Neuropsychologia]]></source>
<year>2013</year>
<volume>51</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>704-12</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ebrahimzadeh]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Alavi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bijar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pakkeshal]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel approach for detection of deception using Smoothed Pseudo Wigner-Ville Distribution (SPWVD)]]></article-title>
<source><![CDATA[Journal biomedical science and engineering]]></source>
<year>2013</year>
<volume>6</volume>
<page-range>8-18</page-range></nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of Incomplete Information on the Detection of Concealed Crime Details]]></article-title>
<source><![CDATA[Applied Phycophysiology biofeedback]]></source>
<year>2011</year>
<volume>36</volume>
<page-range>159-71</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Sommerfeld]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Effects of Guilt, Disbelief, and Assessed]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Lie-Truth Telling Abilities on Physiological Responses in the Guilty Action Test]]></article-title>
<source><![CDATA[Psychology]]></source>
<year></year>
<volume>7</volume>
<page-range>1075-91</page-range></nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farahani]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Moradi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Concealed Information Test with Combination of ERP Recording and Autonomic Measurements]]></article-title>
<source><![CDATA[Neurophysiology]]></source>
<year>2013</year>
<volume>45</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>223-33</page-range></nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gamer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Klimecki]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Bauermann]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Stoeter]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Vossel]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[fMRI-activation patterns in the detection of concealed information rely on memory-related effects]]></article-title>
<source><![CDATA[Scan]]></source>
<year>2012</year>
<volume>7</volume>
<page-range>506-15</page-range></nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ganis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Meixner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kievit]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Schendan]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lying in the scanner: Covert countermeasures disrupt deception detection by functional magnetic resonance imaging]]></article-title>
<source><![CDATA[Neuroimage]]></source>
<year>2011</year>
<volume>55</volume>
<page-range>312-9</page-range></nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Na,]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Novel Concealed Information Test Method Based on Independent Component Analysis and Support Vector Machine]]></article-title>
<source><![CDATA[Clinical EEG and Neuroscience]]></source>
<year>2012</year>
<volume>43</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>54-63</page-range></nlm-citation>
</ref>
<ref id="B75">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tian]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel algorithm to enhance p300 in single trials: Application to lie detection using F-score and SVM]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2014</year>
<volume>9</volume>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B76">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Tao]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Guan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Novel Approach for Lie Detection Based on F-Score and Extreme Learning Machine]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2013</year>
<volume>8</volume>
<numero>6</numero>
<issue>6</issue>
</nlm-citation>
</ref>
<ref id="B77">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Denoised P300 and machine learning-based concealed information test method]]></article-title>
<source><![CDATA[computer methods and programs in biomedicine]]></source>
<year>2011</year>
<volume>104</volume>
<page-range>410-7</page-range></nlm-citation>
</ref>
<ref id="B78">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garret]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lazzaro]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ariely]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharot]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The brain adapts to dishonesty. Nature Neuroscience]]></article-title>
<source><![CDATA[]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B79">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hadar]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Makris]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Yarrow]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The truth-telling motor cortex: Response competition in M1 discloses deceptive behaviour]]></article-title>
<source><![CDATA[Biological Psychology]]></source>
<year>2012</year>
<volume>89</volume>
<page-range>495-502</page-range></nlm-citation>
</ref>
<ref id="B80">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Honts]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Reavy]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The comparison question polygraph test: A contrast of methods and scoring]]></article-title>
<source><![CDATA[Physiology and behavior]]></source>
<year>2015</year>
<volume>143</volume>
<page-range>15-26</page-range></nlm-citation>
</ref>
<ref id="B81">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Pornpattananangkul]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Nusslock]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Executive control- and reward-related neural processes associated with the opportunity to engage in voluntary dishonest moral decision making]]></article-title>
<source><![CDATA[Cognitive affective, behavior neuroscience]]></source>
<year>2015</year>
<volume>15</volume>
<page-range>475-91</page-range></nlm-citation>
</ref>
<ref id="B82">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Temporal course of executive control when lying about self- and other-referential information: An ERP study]]></article-title>
<source><![CDATA[Brain research]]></source>
<year>2011</year>
<volume>1369</volume>
<page-range>149-57</page-range></nlm-citation>
</ref>
<ref id="B83">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Isaychev]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Edrenkin]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Chernorizov]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Isaychev]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<source><![CDATA[Event related potentials in deception detection]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B84">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ito]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Abe]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Fujii]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hayashi]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ueno]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mugikura]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Takahashi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mori]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The contribution of the dorsolateral prefrontal cortex to thepreparation for deception and truth-telling]]></article-title>
<source><![CDATA[Brain Research]]></source>
<year>2012</year>
<volume>1464</volume>
<page-range>43-52</page-range></nlm-citation>
</ref>
<ref id="B85">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ito]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Abe]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Fujii]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Ueno]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Koseki]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Hashimoto]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mugikura]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Takahashi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mori]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of the dorsolateral prefrontal cortex in deception when remembering neutral and emotional events]]></article-title>
<source><![CDATA[Neuroscience Research]]></source>
<year>2011</year>
<volume>69</volume>
<page-range>121-8</page-range></nlm-citation>
</ref>
<ref id="B86">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Junfeng]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jianhui]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Wenjia]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yong]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Feature Optimize and Classification of EEG Signals: Application to Lie Detection Using KPCA and ELM]]></article-title>
<source><![CDATA[Sensors and transducers]]></source>
<year>2014</year>
<volume>169</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>235-40</page-range></nlm-citation>
</ref>
<ref id="B87">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Frontoparietal activity during deceptive responses in the P300-based guilty knowledge test:An sLORETA study]]></article-title>
<source><![CDATA[Neuroimage]]></source>
<year>2013</year>
<volume>78</volume>
<page-range>305-15</page-range></nlm-citation>
</ref>
<ref id="B88">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kosheleva]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Spadoni]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Strigo]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchsbaum]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Simmons]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Faking bad: The neural correlates of feigning memory impairment]]></article-title>
<source><![CDATA[Neuropsychology]]></source>
<year>2016</year>
<volume>30</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>377-84</page-range></nlm-citation>
</ref>
<ref id="B89">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Labkovsky]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The P300-Based, Complex Trial Protocol for Concealed Information Detection Resists Any Number of Sequential Countermeasures Against Up to Five Irrelevant Stimuli]]></article-title>
<source><![CDATA[Applied Phycophysiology biofeedback]]></source>
<year>2012</year>
<volume>37</volume>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B90">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Mei]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Xue]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neural correlates of feigned memory impairment are distinguishable from answering randomly and answering incorrectly: An fMRI and behavioral study]]></article-title>
<source><![CDATA[Brain and cognition]]></source>
<year>2012</year>
<volume>79</volume>
<page-range>70-7</page-range></nlm-citation>
</ref>
<ref id="B91">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marchak]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting false intent using eye blink measures]]></article-title>
<source><![CDATA[Frontiers in psychology]]></source>
<year>2013</year>
<volume>736</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B92">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marchewka]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jednorog]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kalkiewicz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Szeszkowski]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Grabowska]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Szatkowska]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sex, lies and fmri-Gender diffrences in neural basis of deception]]></article-title>
<source><![CDATA[Plos one]]></source>
<year>2012</year>
<volume>7</volume>
<numero>8</numero>
<issue>8</issue>
</nlm-citation>
</ref>
<ref id="B93">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meijer]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bente]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ben-Shakhar]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Schumacher]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting concealed information from groups using a dynamic questioning approach: simultaneous skin conductance measurement and immediate feedback]]></article-title>
<source><![CDATA[Frontiers in psychology]]></source>
<year>2013</year>
<volume>68</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B94">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meixner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Labkovsky]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Winograd]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sokolovsky]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Weishaar]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ullmann]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[P900: A Putative Novel ERP Component that Indexes Countermeasure Use in the P300-Based Concealed Information Test]]></article-title>
<source><![CDATA[Applied psychophysiology biofeedback]]></source>
<year>2013</year>
<volume>38</volume>
<page-range>121-32</page-range></nlm-citation>
</ref>
<ref id="B95">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pasca]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Study regarding psychophysiological reactivity values depending on subject&#8217;s gender in polygraph testing]]></article-title>
<source><![CDATA[Social and Behavioral Sciences]]></source>
<year>2011</year>
<volume>33</volume>
<page-range>821-5</page-range></nlm-citation>
</ref>
<ref id="B96">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peth]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Emotional modulation of memory enconding and retrieval in the concealed Information Test]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Alemania ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Hamburg-Eppendorf]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B97">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peth]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sommer]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hebart]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vossel]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Büchel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Gamer]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Memory detection using fmri -Does the enconding context matter]]></article-title>
<source><![CDATA[Neuroimage]]></source>
<year>2015</year>
<volume>113</volume>
<page-range>164-74</page-range></nlm-citation>
</ref>
<ref id="B98">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ward]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Frigo]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Drapekin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Labkovsky]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evidence suggesting superiority of visual (verbal) vs. auditory test presentation modality in the P300-based, Complex Trial Protocol for concealed autobiographical memory detection]]></article-title>
<source><![CDATA[International Journal of Psychophysiology]]></source>
<year>2015</year>
<volume>96</volume>
<page-range>16-22</page-range></nlm-citation>
</ref>
<ref id="B99">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ward]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Thai]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Labokovsky]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Superiority of Pictorial Versus Verbal Presentation and Initial Exposure in the P300-Based, Complex Trial Protocol for Concealed Memory Detection]]></article-title>
<source><![CDATA[Applied Phycophysiology biofeedback]]></source>
<year>2015</year>
<volume>40</volume>
<page-range>61-73</page-range></nlm-citation>
</ref>
<ref id="B100">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sai]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sang]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting Concealed Information Using Functional Near-Infrared Spectroscopy]]></article-title>
<source><![CDATA[Brain Topography]]></source>
<year>2014</year>
<volume>27</volume>
<page-range>652-62</page-range></nlm-citation>
</ref>
<ref id="B101">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schwedes]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wentura]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The revealing glance: Eye gaze behavior to concealed informatio]]></article-title>
<source><![CDATA[Memory cognition]]></source>
<year>2012</year>
<volume>40</volume>
<page-range>642-51</page-range></nlm-citation>
</ref>
<ref id="B102">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sip]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Carmel]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Marchant]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Petrovic]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Roestorpff]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[MgGregor]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Frith]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[When Pinocchio&#8217;s nose does not grow: belief regarding lie-detectability modulates production of deception]]></article-title>
<source><![CDATA[Frontiers in human neuroscience]]></source>
<year>2013</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11</page-range></nlm-citation>
</ref>
<ref id="B103">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sokolovsky]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rothenberg]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Labkovsky]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Meixner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosenfeld]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel countermeasure against the reaction time index of countermeasure use in the P300-based complex trial protocol for detection of concealed information]]></article-title>
<source><![CDATA[International Journal of Psychophysiology]]></source>
<year>2011</year>
<volume>81</volume>
<page-range>60-3</page-range></nlm-citation>
</ref>
<ref id="B104">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sowdwen]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Banissy]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Catmur]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Bird]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Transcranial Current Stimulation of the Temporoparietal Junction Improves Lie Detection]]></article-title>
<source><![CDATA[Current biology]]></source>
<year>2015</year>
<volume>25</volume>
<page-range>2447-51</page-range></nlm-citation>
</ref>
<ref id="B105">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spadoni]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kosheleva]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchsbaum]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Simmons]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Neural correlates of malingering in mild traumatic brain injury: A positron emission tomography study]]></article-title>
<source><![CDATA[Psychiatric research: Neuroimaging]]></source>
<year>2015</year>
<volume>233</volume>
<page-range>367-72</page-range></nlm-citation>
</ref>
<ref id="B106">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Staunton]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hammond]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Investigation of the Guilty Knowledge Test Polygraph Examination]]></article-title>
<source><![CDATA[Journal of criminal psychology]]></source>
<year>2011</year>
<volume>1</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B107">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ströfer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Noordzi.]]></surname>
<given-names><![CDATA[j.]]></given-names>
</name>
<name>
<surname><![CDATA[Ufkes]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Giebels]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deceptive Intentions: Can Cues to Deception Be Measured before a Lie Is Even Stated?]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2015</year>
<volume>10</volume>
<numero>5</numero>
<issue>5</issue>
</nlm-citation>
</ref>
<ref id="B108">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Identification and Classification of Facial Familiarity in Directed Lying: An ERP Study]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2012</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B109">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tomash]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Reed]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using conditioning to elicit skin conductance responses to deception]]></article-title>
<source><![CDATA[Learning and Motivation]]></source>
<year>2015</year>
<volume>49</volume>
</nlm-citation>
</ref>
<ref id="B110">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vartanian]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Kwantes]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mandel]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Lying in the scanner: Localized inhibition predicts lying skill]]></article-title>
<source><![CDATA[Neuroscience Letters]]></source>
<year>2012</year>
<volume>529</volume>
<page-range>18-22</page-range></nlm-citation>
</ref>
<ref id="B111">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Visu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Bus]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Miclea]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting concealed information from a mock crime scenario by using psychophysiological and rt-based measures. Cognition, Brain, Behavior]]></article-title>
<source><![CDATA[An Interdisciplinary Journal]]></source>
<year>2011</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>19-37</page-range></nlm-citation>
</ref>
<ref id="B112">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vrij]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Oliveira]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hammond]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Erhlichman]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Saccadic eye movement rate as cue to deceit]]></article-title>
<source><![CDATA[Journal of applied research of memory and cognition]]></source>
<year>2015</year>
<volume>4</volume>
<page-range>15-9</page-range></nlm-citation>
</ref>
<ref id="B113">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walczyk]]></surname>
<given-names><![CDATA[J.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Grifth]]></surname>
<given-names><![CDATA[D.A.]]></given-names>
</name>
<name>
<surname><![CDATA[yates]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Visconte]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Simoneaux]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Eye movements and other c ognitive cues to rehearsed and unrehearsed deception when interrogated about a mock crime]]></article-title>
<source><![CDATA[Applied Psychology in Criminal Justice]]></source>
<year>2013</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-23</page-range></nlm-citation>
</ref>
<ref id="B114">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Functional brain network and multichannel analysis for the P300-based brain computer interface system of lying detection]]></article-title>
<source><![CDATA[Expert Systems With Applications]]></source>
<year>2016</year>
<volume>53</volume>
<page-range>117-28</page-range></nlm-citation>
</ref>
<ref id="B115">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chun]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Siong]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Electroencephalography Network and Connectivity Analysis for Deception in Instructed Lying Tasks]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2015</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B116">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Warmelin]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Vrij]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mann]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Leal]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Forrester]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Thermal Imaging as a Lie Detection Tool at Airports]]></article-title>
<source><![CDATA[Law human behavior]]></source>
<year>2011</year>
<page-range>40-8</page-range></nlm-citation>
</ref>
<ref id="B117">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zheng]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A New Approach for Concealed Information Identification Based on ERP Assessment]]></article-title>
<source><![CDATA[J Med Syst]]></source>
<year>2012</year>
<volume>36</volume>
<page-range>2401-9</page-range></nlm-citation>
</ref>
<ref id="B118">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zvi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Nachson]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Elaad]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of coping and cooperative instructions on guilty and informed innocents' physiological responses to concealed information]]></article-title>
<source><![CDATA[]]></source>
<year>2012</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
