1. Zhu, Z., Lu, G., Chen, Y., Fu, Z.J., Roberts, P., Han, K.: Botnet research survey. Northwestern University, Evanston (IEEE) (2008)
2. Seifert, C., Endicott-Popovsky, B., Frincke, D., Komisarczuk, P., Muschevici, R., Welch, I.: Justifying the need for forensically ready protocols: a case study of identifying malicious web servers using client honeypots, vol. 11, no. 1 (2008)
3. Jiang, X., Wang, X.: Out-of-the-Box Monitoring of VM-based High-Interaction Honeypots. Springer, Heidelberg (2007)
4. Alosefer, Y., Rana, O.: Clustering client honeypot data to support malware analysis. Knowledge-Based and Intelligent Information and Engineering Systems. Lecture Notes in Computer Science, vol. 6279, pp. 556–565 (2010)
5. Spitzner, L.: Definition and value of honeypots.
http://www.tracking-hackers.com/papers/honeypots.hmtl