Honeypot-based forensics, AusCERT Asia Pacific Information Technology Security Conference, 2004. ,
The honeynet project: trapping the hackers, IEEE Security & Privacy Magazine, vol.1, issue.2, pp.15-23, 2003. ,
DOI : 10.1109/MSECP.2003.1193207
URL : http://www.mnlab.cs.depaul.edu/~mtaibah/papers/control and containment/The Honeynet Project_ trapping the hackers.pdf
Honeypots: Tracking Hackers, 2003. ,
Honeypots: a New Paradigm to Information Security, Boca Raton, 2011. ,
Experiences with a Generation III virtual Honeynet, 2009 Australasian Telecommunication Networks and Applications Conference (ATNAC), 2009. ,
DOI : 10.1109/ATNAC.2009.5464785
What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks, International Conference on Passwords, pp.72-91, 2015. ,
DOI : 10.1007/978-3-642-04989-7_13
Set-up and deployment of a high-interaction honeypot: experiment and lessons learned, Journal in Computer Virology, vol.39, issue.5, pp.143-157, 2011. ,
DOI : 10.1145/1095809.1095825
URL : https://hal.archives-ouvertes.fr/hal-00762596
Lessons learned from the deployment of a high-interaction honeypot. arXiv preprint, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00140355
Study of Internet Threats and Attack Methods Using Honeypots and Honeynets, International Conference on Computer Networks, pp.118-127, 2014. ,
DOI : 10.1007/978-3-319-07941-7_12
Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection, International Conference on Computer Networks, pp.69-81, 2015. ,
DOI : 10.1007/978-3-319-19419-6_7
Large scale malware collection: lessons learned Citeseer, IEEE SRDS Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems, 2008. ,
A framework for attack patterns' discovery in honeynet data, Digital Investigation, vol.5, pp.128-139, 2008. ,
DOI : 10.1016/j.diin.2008.05.012
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization, IEEE EUROCON 2015, International Conference on Computer as a Tool (EUROCON), pp.1-6, 2015. ,
DOI : 10.1109/EUROCON.2015.7313713
Network malware activity?a view from honeypot systems Springer 18. IP-API.com service. Accessed: 20th, International Conference on Computer Networks, pp.198-206, 2012. ,
DOI : 10.1007/978-3-642-31217-5_22
Data collection and data analysis in honeypots and honeynets, Proceedings of the Security and Protection of Information, 2015. ,
The Chi-square test of independence, Biochemia Medica, vol.23, issue.2, pp.143-149, 2013. ,
DOI : 10.11613/BM.2013.018
Understanding interobserver agreement: the kappa statistic, Fam Med, vol.37, issue.5, pp.360-363, 2005. ,