Avery, J., Almeshekah, M., & Spafford, E. (2017). Offensive Deception in Computing. In 12th International Conference on Cyber Warfare and Security 2017 Proceedings (p. 23).
The Cost of Deception, , J. Avery, C. N. Gutierrez, E. H. Spafford. 17th Annual CERIAS Information Security Symposium: Poster, West Lafayette, IN, USA, April 2016.
Deception in Computing: Where and How it Has Been Used, J. Avery, C. N. Gutierrez, M. Almeshekah, S.
Bagchi, and E. H. Spafford, 16th Annual CERIAS Information Security Symposium: Poster, West Lafayette, IN, USA, March 2015.
The Case of Using Negative (Deceiving) Information in Data Protection, M. Almeshekah and E. Spafford, in Proceedings of the 9th International Conference on Cyber Warfare and Security ICCWS-2014, ISSN: 2048-9870, Academic Conferences and Publishing International Limited, March 2014. [paper] . [15th CERIAS Symposium: poster (Best Poster Award)]
“Improving Security Using Deception, M. Almeshekah, E. Spafford and M. Atallah, The Center for Education and Research in Information Assurance and Security: Technical Report (CERIAS TR 2013-13).
A Presentation, Truth and Consequences, that Spaf has given recently in several places, including University of Central Florida and Texas A&M University.
Systemization, Modeling and Integrating of Deception
A Hypergame Analysis for ErsatzPasswords; Christopher Gutierrez, Mohammed Almeshekah, Eugene Spafford and Saurabh Bagchi; in proceedings of 33rd IFIP TC-11 SEC 2018 International Conference on Information Security and Privacy Protection, Poznan, Poland.
Jeffrey Avery and John Ross Wallrabenstein. Formally modeling deceptive patches using a game-based approach, in Computers & Security, Elsevier, v75 pp 182-190, March 2018. [Paper]
Jeff Avery. The Application of Deception to Software Security Patching Purdue University Computer Science, Ph.D. Dissertation and CERIAS TR 2017-03, August 2017. [PhD disseration]
Avery, J., & Spafford, E. H. (2017, May). Ghost Patches: Fake Patches for Fake Vulnerabilities. In IFIP International Conference on ICT Systems Security and Privacy Protection (pp. 399-412). Springer, . [Paper].