Deception planning models for cyber security | IEEE Conference Publication | IEEE Xplore