A case study about the use and evaluation of cyber deceptive methods against highly targeted attacks | IEEE Conference Publication | IEEE Xplore