Keyphrases
Academia-industry Collaboration
6%
Academic Research
6%
Adaptation
20%
Adversary
6%
Asymmetric Game
10%
Attack Strategy
30%
Attack Surface
6%
Attacker
33%
Attacker Profile
10%
Challenging Tasks
10%
Complementary Method
10%
Cyber Deception
100%
Cyber Systems
10%
Cyber Warfare
10%
Cybersecurity
6%
Deception System
30%
Deliberate Introductions
10%
Detection Method
6%
Dynamic Characterization
10%
Effective Adaptation
10%
Exchange Experience
10%
Face-to-face Communication
10%
False Target
10%
Fuzzing
10%
Government Agencies
10%
Honeypot
10%
Human Intervention
10%
Invited Speakers
10%
Misinformation
10%
Prevention Methods
10%
Static Configuration
10%
Surrounding Environment
10%
Target Environment
6%
Travel Support
10%
Computer Science
Adaptation Property
16%
Attack Surface
11%
Attack Technique
16%
Attackers
66%
Cyber Attack
11%
Cybersecurity
11%
Fuzzing
16%
Honeypots
16%
Human Intervention
16%
Misinformation
16%
Observed Action
16%
Surrounding Environment
16%
Target Environment
16%