1. Spitzner, L.: Honeypots: Tracking Hackers. Addison Wesley Pearson Education, Boston (2002)
2. Bidgoli, H.: Handbook of Information Security. Wiley, Hoboken, New Jersey
3. Kreibich, C., Crowcroft, J.: Honeycomb–creating intrusion detectionsignatures using honeypots. In: Workshop on Hot Topics in Networks (Hotnets-II), Cambridge, Massachusetts, Nov 2003
4. Kim, H.-A., Karp, B.: Autograph: toward automated, distributed wormsignature detection. In: Proceedings of 13 USENIX Security Symposium, SanDiego, CA, Aug 2004
5. Singh, S., Estan, C., Varghese, G., Savage, S.: Automated wormfingerprinting. In: Proceedings of the 6th conference on Symposium on Operating Systems Design and Implementation (OSDI), Dec 2004