1. A new procedure to detect low interaction honeypots;Aguirre-Anaya E.;International Journal of Electrical and Computer Engineering,2014
2. Amazon. 2020. Alexa—An Amazon Company. Amazon. https://www.alexa.com/topsites.
3. Ofir Arkin Fyodor Yarochkin and Meder Kydyraliev. 2003. The Present and Future of Xprobe2—The Next Generation of Active Operating System Fingerprinting . SYS-Security Groups.
4. John Bethencourt, Jason Franklin, and Mary Vernon. 2005. Mapping Internet sensors with probe response attacks. In Proceedings of the 14th USENIX Security Symposium (USENIX Security’05). USENIX Association, Baltimore, MD. https://www.usenix.org/conference/14th-usenix-security-symposium/mapping-internet-sensors-probe-response-attacks.
5. Harold Booth, Doug Rike, and Gregory Witte. 2013. The National Vulnerability Database (NVD): Overview. Technical Report. National Institute of Standards and Technology.