A. Internet and I. , Alexa -The Web Information Company

J. Dean and S. Ghemawat, MapReduce, Communications of the ACM, vol.51, issue.1, pp.107-113, 2008.
DOI : 10.1145/1327452.1327492

J. P. John, F. Yu, Y. Xie, A. Krishnamurthy, and M. Abadi, Heat-seeking honeypots, Proceedings of the 20th international conference on World wide web, WWW '11, p.207, 2011.
DOI : 10.1145/1963405.1963437

V. I. Levenshtein, Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady, vol.10, p.707, 1966.

M. Mueter, F. Freiling, T. Holz, and J. Matthews, A generic toolkit for converting web applications into high-interaction honeypots, 2008.

N. Nassar and G. Miller, Method for Two Dimensional Honeypot in a Web Application, Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.681-686, 2012.
DOI : 10.4108/icst.collaboratecom.2012.250743

K. Perry, Honeypot Technique of Blocking Spam -Dex Media, 2013.

C. Pohl and H. J. Hof, The all-seeing eye: A massive multi-sensor zero-configuration intrusion detection system for web applications, SECURWARE 2013, The Seventh International Conference on Emerging Security Information, Systems and Technologies, 2013.

C. Pohl, K. Schlierkamp, and H. J. Hof, BREW: A breakable web application, European Conference of Software Engineering Education, p.2014, 2014.

Y. Wang, Y. Wang, T. Peng, T. Peng, W. Zuo et al., Automatic Filling Forms of Deep Web Entries Based on Ontology. Web Information Systems and, pp.376-380, 2009.