[3] Iffat Anjum, Mohammad Sujan Miah, Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, Munindar P Singh, Optimizing Vulnerability-Driven Honey Traffic Using Game Theory, AAAI Workshop on Artificial Intelligence for Cyber Security (AICS), 2020. [link][pdf]