1. Using deep learning to generate relational honeydata;Abay;Auton. Cyber Decep. Reason. Adapt. Plan. Eval. HoneyThings,2019
2. Firewall policy advisor for anomaly discovery and rule editing;Al-Shaer;Integr. Netw. Manag. VIII: Managing it all,2003
3. A deception based approach for defeating OS and service fingerprinting;Albanese,2015
4. ErsatzPasswords: Ending password cracking and detecting password leakage;Almeshekah,2015
5. Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4;Anastasova,2022