1. Wikipedia. http://en.wikipedia.org/wiki/Honeypot
2. Przemyslaw, K., Dorosz, P.: Intrusion Detection Systems (IDS) Part I—(Network Intrusions; Attack Symptoms; IDS Tasks; and IDS Architecture). www.windowsecurity.com (Articles & Tutorials)
3. Sarkar, S., Brindha, M.: High performance network security using NIDS approach. I.J. Inf. Technol. Comput. Sci. 07 (2014)
4. Ask Karin.: Automatic Malware Signature Detection, 10. http://www.gecode.org/~schulte/teaching/theses/ICT-ECS-2006-122.pdf (2006)
5. What is cloud antivirus and how does it work? https://zeltser.com/what-is-cloud-anti-virus/