The following publications are possibly variants of this publication:
- Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception GamesAchile Leonel Nguemkam, Ahmed H. Anwar, Vianney Kengne Tchendji, Deepak K. Tosh, Charles A. Kamhoua. pimrc 2023: 1-6 [doi]
- Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic ApproachAhmed H. Anwar, Charles A. Kamhoua. ccnc 2022: 543-549 [doi]
- Honeypot Allocation over Attack Graphs in Cyber Deception GamesAhmed H. Anwar, Charles A. Kamhoua, Nandi Leslie. iccnc 2020: 502-506 [doi]
- Honeypot Allocation for Cyber Deception in Internet of Battlefield Things SystemsAhmed H. Anwar, Nandi O. Leslie, Charles A. Kamhoua. milcom 2021: 1005-1010 [doi]
- Lightweight On-Demand Honeypot Deployment for Cyber DeceptionJaime C. Acosta, Anjon Basak, Christopher Kiekintveld, Charles A. Kamhoua. icdf2c 2022: 294-312 [doi]
- Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame TheoryAhmed H. Anwar, Mu Zhu, Zelin Wan, Jin-Hee Cho, Charles A. Kamhoua, Munindar P. Singh. globecom 2022: 3393-3398 [doi]
- Optimizing Honeypot Placement Strategies with Graph Neural Networks for Enhanced Resilience via Cyber DeceptionMohamed Osman, Tamer Nadeem, Ahmed Hemida, Charles A. Kamhoua. gnnet 2023: 37-43 [doi]
- General-Sum Cyber Deception Games under Partial Attacker Valuation InformationOmkar Thakoor, Milind Tambe, Phebe Vayanos, Haifeng Xu, Christopher Kiekintveld. atal 2019: 2215-2217 [doi]