1. [1] Loshin, P.: Details emerging on Dyn DNS DDoS attack, Mirai IoT botnet, TechTarget network, available from <http://searchsecurity.techtarget.com/news/450401962/Details-emerging-on-Dyn-DNS-DDoS-attack-Mirai-IoT-botnet> (accessed 2019-02-06).
2. [2] Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T. and Rossow, C.: IoTPOT: A Novel Honeypot for Revealing Current IoT Threats, Journal of Information Processing, Vol.24, No.3, pp.522-533 (2016).
3. [3] Guarnizo, J.D., Tambe, A., Bhunia, S.S., Ochoa, M., Tippenhauer, N.O., Shabtai, A. and Elovici, Y.: Siphon: Towards scalable high-interaction physical honeypots, Proc. 3rd ACM Workshop on Cyber-Physical System Security, pp.57-68 (Apr. 2017).
4. [4] Luo, T., Xu, Z., Jin, X., Jia, Y. and Ouyang, X.: Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices, Black Hat (2017).
5. [5] Ezawa, Y., Tamiya, K., Nakayama, S., Tie, Y., Yoshioka, K. and Matsumoto, T.: An Analysis of Attacks Targeting WebUI of Embedded Devices by Bare-metal Honeypot, Computer Security Symposium 2017 (Oct. 2017).