1. IDC. New IDC Spending Guide. 2017 [cited 2018 16 March ]; Available from: https://www.idc.com/getdoc.jsp?containerId=prUS43165817.
2. Fan, W., et al., Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Systems Journal, 2017.
3. Pandya, S.S., Active Defence System for Network Security- Honeypot. Advances in Computer Science and Information Technology (ACSIT), 2015. 2(4): p. 383--386.
4. reserved., -.C.I.A.r. Cymmetria releases honeypots for two Oracle vulnerabilities. [Online] 2018 2018 [cited 2018 21 Feb]; Available from: https://cymmetria.com/blog/honeypots-for-oracle-vulnerabilities/.
5. Nawrocki, M., et al., A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249, 2016.