1. M. H. Almeshekah and E. H. Spafford. The Case of Using Negative (Deceiving) Information in Data Protection. Academic Conferences and Publishing International, 2014.
2. J. B. Bell and B. Whaley. Cheating and Deception. Transaction Publishers New Brunswick, 1991.
3. M. Bennett and E. Waltz. Counterdeception Principles and Applications for National Security. Artech House, 2007.
4. M. Bercovitch, M. Renford, L. Hasson, A. Shabtai, L. Rokach, and Y. Elovici. HoneyGen: An Automated Honeytokens Generator. In Intelligence and Security Informatics (ISI), 2011 IEEE International Conference on, pages 131--136. IEEE, 2011.
5. J. Boyd. The Essence of Winning and Losing, 1995.