1. Stoll, C.: The cuckoo’s egg: tracking a spy through the maze of computer espionage. The Bodley Head Ltd. (1990)
2. Artail, H., Safa, H., Sraj, M., et al.: A hybrid honeypot framework for improving intrusion detection systems inprotecting organizational networks. Computers and Security 25(4), 274–288 (2006)
3. Spitzner, L.: Honeypots Tracking Hackcr. AddisonWesley, America (2003)
4. Anagnostakis, K., Sidiroglou, S., Akritidis, P., et al.: Detecting targeted attacks using shadow honeypots. USENIX Security (2005)
5. Yin, C., Li, M., Ma, J., et al.: Honeypot and scan detection in intrusion detection system. In: Canadian Conference on Electrical and Computer Engineering (2004)