1. Misra, R., Renu, D.: Cyber crime investigation and network forensic system using honeypot. Int. J. Latest Trends Eng. Technol. 1, 34–40 (2012)
2. Li, Z.C., Li, X.J., Gong, L , Computer forensics system based on honeypot. In: Proceedings of the Third International Symposium on Computer Science and Computational Technology (ISCSCT’10), August, pp. 336–337 (2010)
3. Vasilomanolakis, E., Karuppayah, S., MÜhlhäuser, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 55 (2015)
4. Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the International Conference on Communication, Computing & Security. ACM, 2011, pp. 600–605 (2011)
5. Bringer, M.L., Chelmecki, C.A., Fujinoki, H.: A survey: Recent advances and future trends in honeypot research. Int. J. 4, 63 (2012)