Deception for security Some interesting takes on an old topic: https://www.cerias.purdue.edu/site/deception/