Redundancy vs. Protection vs. False Targets for Systems Under Attack | IEEE Journals & Magazine | IEEE Xplore