Looking from the hacker's perspective: Role of deceptive strategies in cyber security | IEEE Conference Publication | IEEE Xplore