1. A survey of network anomaly detection techniques;Ahmed;Journal of Network and Computer Applications,2016
2. Cyber threat intelligence from honeypot data using elasticsearch;Almohannadi,2018
3. Use of honeypots for mitigating DoS attacks targeted on IoT networks;Anirudh,2017
4. Anomaly detection in computer networks: A state-of-the-art review;Baddar;Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications,2014
5. Critical infrastructure under attack: lessons from a honeypot;Barak;Network Security,2020