Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, and Quanyan Zhu
In this paper, the authors formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user.