1. E. Alata, M. Dacier, Y. Deswarte, M. Kaaâniche, K. Kortchinsky, V. Nicomette, V. Pham, F. Pouget, Collection and analysis of attack data based on honeypots deployed on the internet, in Proceedings of the Quality of Protection - Security Measurements and Metrics (2006), pp. 79–91
2. M. Albanese, S. Jajodia, S. Noel, Time-efficient and cost-effective network hardening using attack graphs, in Proceedings of the IEEE DSN’12 (2012), pp. 1–12
3. R. Albert, H. Jeong, A. Barabasi, Error and attack tolerance of complex networks. Nature 406, 378–482 (2000)
4. S. Almotairi, A. Clark, M. Dacier, C. Leita, G. Mohay, V. Pham, O. Thonnard, J. Zimmermann, Extracting inter-arrival time based behaviour from honeypot traffic using cliques, in 5th Australian Digital Forensics Conference (2007), pp. 79–87
5. S. Almotairi, A. Clark, G. Mohay, J. Zimmermann, Characterization of attackers’ activities in honeypot traffic using principal component analysis, in Proceedings of the IFIP International Conference on Network and Parallel Computing (2008), pp. 147–154