1. Deceiving network reconnaissance using SDN-based virtual topologies.;Achleitner;IEEE Trans. Netw. Serv. Manag.,2017
2. The role of information about an opponent’s actions and intrusion detection alerts on cyber decisions in cyber security games.;Aggarwal;Cyber Security,2020
3. Hackit: a human-in-the-loop simulation tool for realistic cyber deception experiments;Aggarwal;Proceedings of the International Conference on Applied Human Factors and Ergonomics,2019
4. Cyber-security: role of deception in cyber-attack detection;Aggarwal;Advances in Human Factors in Cybersecurity
5. Looking from the hacker’s perspective: role of deceptive strategies in cyber security;Aggarwal;Proceedings of the 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)