1. Incorporating honeypot for intrusion detection in cloud infrastructure;Borisaniya,2012
2. Implementation of honeypots for server security;Somwanshi;Int. Res. J. Eng. Technol. (IRJET),2016
3. Distributed and highly-scalable wan network attack sensing and sophisticated analysing framework based on honeypot technology;Fraunholz,2017
4. {DarkNOC}: dashboard for honeypot management;Sobesto,2011
5. Modeling and clustering attacker activities in iot through machine learning techniques;Sun;Inf. Sci.,2019