1. Achleitner S, La Porta TF, McDaniel P, Sugrim S, Krishnamurthy SV, Chadha R (2017) Deceiving network reconnaissance using SDN-based virtual topologies. IEEE Trans Netw Serv Manag 14(4):1098–1112
2. Al-Shaer E, Wei J, Hamlen KW, Wang C (2019) Honeypot deception tactics. In: Autonomous cyber deception. Springer, pp 35–45
3. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M et al (2017) Understanding the mirai botnet. In: 26th USENIX security symposium (USENIX Security 17), pp 1093–1110
4. Aziz MZBA, Okamura K (2016) An analysis of botnet attack for smtp server using software define network (sdn). Proc Asia Pac Adv Netw 42:21–26
5. Barocas S, Hardt M, Narayanan A (2017) Fairness in machine learning. http://fairmlbook.org, http://www.fairmlbook.org