Cyber-deception and attribution in capture-the-flag exercises | IEEE Conference Publication | IEEE Xplore