Honeypot Allocation Games over Attack Graphs for Cyber Deception | part of Game Theory and Machine Learning for Cyber Security | Wiley-IEEE Press books | IEEE Xplore