Counterplanning deceptions to foil cyber-attack plans | IEEE Conference Publication | IEEE Xplore