1. Pouget, F., Dacier, M., Debar, H.: White paper: honeypot, honeynet, honeytoken: terminological issues. Rapp. Tech. EURECOM. 1–26 (2003)
2. Spitzner, L.: Honeypots: Catching the insider threat. In: Computer Security Applications Conference, 2003, pp. 170–179. IEEE (2003)
3. The Honeynet project: Know Your Enemy: Learning about Security Threats, 2nd edn. Addison Wesley (2004)
4. Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the 2011 International Conference on Communication, Computing & Security. pp. 600–605. ACM, ODISHA, India (2011)
5. Joshi, R.C., Sardana, A.: Honeypots: A New Paradigm to Information Security. Science Publishers, USA (2011)