1. Alberdi, I., Gabès, J., Jamtel, E.L.: UberLogger : un observatoire niveau noyau pour la lutte informatique défensive. In: Symposium sur la Sécurité des Technologies de l’Information et des Communications (2005)
2. Alata, E.: Observation, caractérisation et modélisation de processus d’attaques sur Internet. PhD thesis, LAAS-CNRS, Toulouse (2007)
3. Alata, E., Nicomette, V., Kaâniche, M., Dacier, M., Herrb, M.: Lessons learned from the deployment of a high-interaction honeypot. In: 6th European Dependable Computing Conference (EDCC’06), pp. 39–44, Coimbra (2006)
4. Bakos, G.: Tiny honeypot- resource consumption for the good guys. http://www.alpinista.org/thp
5. Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The Internet motivon sensor: a distributed blackhole monitoring system. In: 12th Annual Network and Distributed System Security Symposium (NDSS), San Diego (2005)