F. Pouget and M. Dacier, Honeypot-based forensics, AusCERT Asia Pacific Information Technology Security Conference, 2004.

L. Spitzner, The honeynet project: trapping the hackers, IEEE Security & Privacy Magazine, vol.1, issue.2, pp.15-23, 2003.
DOI : 10.1109/MSECP.2003.1193207

URL : http://www.mnlab.cs.depaul.edu/~mtaibah/papers/control and containment/The Honeynet Project_ trapping the hackers.pdf

L. Spitzner, Honeypots: Tracking Hackers, 2003.

R. Joshi and A. Sardana, Honeypots: a New Paradigm to Information Security, Boca Raton, 2011.

F. H. Abbasi and R. Harris, Experiences with a Generation III virtual Honeynet, 2009 Australasian Telecommunication Networks and Applications Conference (ATNAC), 2009.
DOI : 10.1109/ATNAC.2009.5464785

A. Abdou, D. Barrera, and P. C. Van-oorschot, What Lies Beneath? Analyzing Automated SSH Bruteforce Attacks, International Conference on Passwords, pp.72-91, 2015.
DOI : 10.1007/978-3-642-04989-7_13

V. Nicomette, M. Kaâniche, E. Alata, and M. Herrb, Set-up and deployment of a high-interaction honeypot: experiment and lessons learned, Journal in Computer Virology, vol.39, issue.5, pp.143-157, 2011.
DOI : 10.1145/1095809.1095825

URL : https://hal.archives-ouvertes.fr/hal-00762596

E. Alata, V. Nicomette, M. Dacier, and M. Herrb, Lessons learned from the deployment of a high-interaction honeypot. arXiv preprint, 2007.
URL : https://hal.archives-ouvertes.fr/hal-00140355

T. Sochor and M. Zuzcak, Study of Internet Threats and Attack Methods Using Honeypots and Honeynets, International Conference on Computer Networks, pp.118-127, 2014.
DOI : 10.1007/978-3-319-07941-7_12

T. Sochor and M. Zuzcak, Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection, International Conference on Computer Networks, pp.69-81, 2015.
DOI : 10.1007/978-3-319-19419-6_7

J. Canto, M. Dacier, E. Kirda, and C. Leita, Large scale malware collection: lessons learned Citeseer, IEEE SRDS Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems, 2008.

O. Thonnard and M. Dacier, A framework for attack patterns' discovery in honeynet data, Digital Investigation, vol.5, pp.128-139, 2008.
DOI : 10.1016/j.diin.2008.05.012

P. Sokol, L. Kleinová, and M. Husák, Study of attack using honeypots and honeynets lessons learned from time-oriented visualization, IEEE EUROCON 2015, International Conference on Computer as a Tool (EUROCON), pp.1-6, 2015.
DOI : 10.1109/EUROCON.2015.7313713

M. Skrzewski, Network malware activity?a view from honeypot systems Springer 18. IP-API.com service. Accessed: 20th, International Conference on Computer Networks, pp.198-206, 2012.
DOI : 10.1007/978-3-642-31217-5_22

P. Sokol, P. Pekarcik, and T. Bajtos, Data collection and data analysis in honeypots and honeynets, Proceedings of the Security and Protection of Information, 2015.

M. L. Mchugh, The Chi-square test of independence, Biochemia Medica, vol.23, issue.2, pp.143-149, 2013.
DOI : 10.11613/BM.2013.018

A. J. Viera and J. M. Garrett, Understanding interobserver agreement: the kappa statistic, Fam Med, vol.37, issue.5, pp.360-363, 2005.