Game theory for security: Key algorithmic principles, deployed systems, lessons learned | IEEE Conference Publication | IEEE Xplore