1. Fraunholz, D., Anton, S.D., Lipps, C., Reti, D., Krohmer, D., Pohl, F., Tammen, M., and Schotten, H.D. (2018). Demystifying Deception Technology: A Survey. arXiv.
2. (2023, March 24). Deception: Theory and Practice. Available online: https://apps.dtic.mil/sti/citations/ADA563489.
3. Bell, J.B., and Whaley, B. (2023, March 24). Cheating and Deception. Available online: https://books.google.co.kr/books?hl=ko&lr=&id=ojmwSoW8g7IC&oi=fnd&pg=PR9&dq=Cheating+and+deception&ots=b7d5DFI8D8&sig=nwA23mVFQMHI4tpgi0_YAvZc65I&redir_esc=y#v=onepage&q=Cheating%20and%20deception&f=false.
4. (2023, March 30). The Value of Honeypots—Honeypots: Tracking Hackers. Available online: https://www.oreilly.com/library/view/honeypots-tracking-hackers/0321108957/0321108957_ch04.html.
5. Stoll, C. (1989). The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday.