Keyphrases
Cyber Deception
100%
Attacker
33%
Attack Strategy
30%
Deception System
30%
Adaptation
20%
Exchange Experience
10%
Fuzzing
10%
Effective Adaptation
10%
Honeypot
10%
Static Configuration
10%
Attacker Profile
10%
Face-to-face Communication
10%
Challenging Tasks
10%
Cyber Systems
10%
Dynamic Characterization
10%
Surrounding Environment
10%
Travel Support
10%
Invited Speakers
10%
Government Agencies
10%
Deliberate Introductions
10%
Asymmetric Game
10%
Cyber Warfare
10%
Prevention Methods
10%
Misinformation
10%
False Target
10%
Human Intervention
10%
Complementary Method
10%
Cybersecurity
6%
Academic Research
6%
Target Environment
6%
Academia-industry Collaboration
6%
Attack Surface
6%
Adversary
6%
Detection Method
6%
Computer Science
Attackers
66%
Surrounding Environment
16%
Fuzzing
16%
Human Intervention
16%
Adaptation Property
16%
Observed Action
16%
Misinformation
16%
Attack Technique
16%
Target Environment
16%
Honeypots
16%
Cyber Attack
11%
Attack Surface
11%
Cybersecurity
11%