For Unknown Secrecies Refusal is Better than Lying In: Research Advances in Database and Information Systems Security, {IFIP} {WG} 11, Thirteenth International Conference on Database Security, pp.127-141, 1999. ,
Baiting inside attackers using decoy documents, 2009. ,
DOI : 10.1007/978-3-642-05284-2_4
A Survey: Recent Advances and Future Trends in Honeypot Research, International Journal of Computer Network and Information Security, vol.4, issue.10, 2012. ,
DOI : 10.5815/ijcnis.2012.10.07
Graph theory, Grad. Texts in Math, vol.101, 2005. ,
Automatic detection of fake file systems, 2005. ,
The mathematical theory of communication, 1949. ,
Honeypots: catching the insider threat, 19th Annual Computer Security Applications Conference, 2003. Proceedings., pp.170-179, 2003. ,
DOI : 10.1109/CSAC.2003.1254322
The cuckoos egg: Tracing a spy through the maze of computer espionage, 1989. ,
Lost in Translation: Improving Decoy Documents via Automated Translation, 2012 IEEE Symposium on Security and Privacy Workshops, pp.129-133, 2012. ,
DOI : 10.1109/SPW.2012.20
URL : http://ieee-security.org/TC/SPW2012/proceedings/4740a129.pdf
Canary Files: Generating Fake Files to Detect Critical Data Loss from Complex Computer Networks, The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013, pp.170-179, 2013. ,
Design requirements for generating deceptive content to protect document repositories, 2014. ,
Honeyfiles: deceptive files for intrusion detection In: Information Assurance Workshop, Proceedings from the Fifth Annual IEEE SMC, pp.116-122, 2004. ,
DOI : 10.1109/iaw.2004.1437806