1. Blair J.P., Levine T.R., Reimer T.O., andMcCluskey, J.D. The gap between reality and research: Another look at detecting deception in field settings.Policing: An International Journal of Police Strategies & Management, 2012. 2. Kaltsa V., Briassouli A., Kompatsiaris I., Hadjileontiadis L.J., andStrintzis M.G.Swarm intelligence for detecting interesting events in crowded environments. IEEE transactions on image processing, vol. 24, no. 7, pp. 2153-2166, 2015. 3. Fraunholz D., Anton S.D., Lipps C., Reti D., Krohmer D., Pohl F., Tammen M., andSchotten H.D.Demystifying deception technology: A survey.arXiv preprint arXiv:1804.06196, 2018. 4. Lomonaco V.et al. Avalanche: an End-to-End Library for Continual Learning, 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), pp. 3595-3605, 2021. 5. Urias V.E., Stout W.M., Luc-Watson, J., Grim, C., Liebrock, L., and Merza, M. Technologies to enable cyber deception. In2017 International Carnahan Conference on Security Technology (ICCST), IEEE, pp. 1-6, 2017 6. Castro F.M.,Marín-Jiménez, M.J., Guil, N., Schmid, C., and Alahari, K. End-to-end incremental learning. InProceedings of the European conference on computer vision (ECCV), pp. 233-248, 2018. 7. Parisi G.I., Kemker R., Part J.L., Kanan C., andWermter S.Continual lifelong learning with neural networks: A review. Neural Networks, vol. 113, pp. 54-71, 2019. 8. Cermelli F., Mancini M., Bulo S.R., Ricci E. and Caputo B.Modeling the background for incremental learning in semantic segmentation. InProceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 9233-9242, 2020. 9. Learn classification algorithms using Python and scikit-learn, https://developer.ibm.com/tutorials/learn-classification-algorithms-using-python-and-scikit-learn/, accessed in February 2022. 10. Overcoming catastrophic forgetting in neural networks, https://www.pnas.org/content/114/13/3521, accessed in December 2022. 11. Handa A., Negi R., andShukla S.K.Part I Deception Technologies & Threat Visibility-Honeypots and Security Operations, 2021. 12. Hayes, T.L. and Kanan, C.Lifelong machine learning with deep streaming linear discriminant analysis. InProceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops, pp. 220-221, 2020. 13. Liu, J. and Benslimane, A. 3 Unmanned Driving Security and Navigation Deception, 2021. 14. Gao C., Wang Y., Xiong X., andZhao W.Mtdcd: an mtd enhanced cyber deception defense system. In 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), IEEE, vol. 4, pp. 1412-1417, 2021. 15. Yang J., Xiang L., Chen R., Li W., andLi B.Differential privacy for tensor-valued queries. IEEE Transactions on Information Forensics and Security, vol. 17, pp. 152-164, 2021. 16. Gu C., Chang C.H., Liu W., Yu S., Wang Y., andO’Neill, M. A modeling attack resistant deception technique for securing lightweight-PUF-based authentication. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 40, no. 6, pp. 1183-1196, 2020. 17. Almeshekah, M.H. and Spafford, E.H. Planning and integrating deception into computer security defenses. In Proceedings of the 2014 New Security Paradigms Workshop, pp. 127-138, 2014 18. Steingartner W., Galinec D., andKozina A.Threat defense: Cyber deception approach and education for resilience in hybrid threats model. Symmetry, vol. 13, no. 4, pp. 597, 2021. 19. Network Topology Mapping & Visualization, https://ipfabric.io/product/network-mapping/, accessed in February 2022 20. Well-Known TCP Port Numbers, https://www.webopedia.com/reference/well-known-tcp-port-numbers/, accessed in December 2021. |