1. Bakos G, Bratus S (2005) Ubiquitous redirection as access control response. In: Proceedings of the 3rd annual conference on privacy, security and trust, New Brunswick, Canada, 12–14 Oct, 2005
2. Bodmer S, Kilger A, Carpenter G, Jones J (2012) Reverse deception: organized cyber threat counter-exploitation. McGraw-Hill Education, New York
3. Chang H-Y, Wu S, Jou Y (2001) Real-time protocol analysis for detecting link-state routing protocol attacks. ACM Trans Inf Syst Secur 4(1):1–36
4. Chapple M, Ballad B, Ballad T, Banks E (2013) Access control, authentication, and public key infrastructure, 2nd edn. Jones and Bartlett, New York
5. Cohen F (1999) A mathematical structure of simple defensive network deceptions. all.net/journal/deception/mathdeception/mathdeception.html. Accessed 15 Jan 2016