J. Biskup, For Unknown Secrecies Refusal is Better than Lying In: Research Advances in Database and Information Systems Security, {IFIP} {WG} 11, Thirteenth International Conference on Database Security, pp.127-141, 1999.

B. M. Bowen, S. Hershkop, A. A. Keromytis, and S. S. Stolfo, Baiting inside attackers using decoy documents, 2009.
DOI : 10.1007/978-3-642-05284-2_4

M. L. Bringer, C. A. Chelmecki, and H. Fujinoki, A Survey: Recent Advances and Future Trends in Honeypot Research, International Journal of Computer Network and Information Security, vol.4, issue.10, 2012.
DOI : 10.5815/ijcnis.2012.10.07

R. Diestel, Graph theory, Grad. Texts in Math, vol.101, 2005.

N. C. Rowe, Automatic detection of fake file systems, 2005.

C. E. Shannon and W. Weaver, The mathematical theory of communication, 1949.

L. Spitzner, Honeypots: catching the insider threat, 19th Annual Computer Security Applications Conference, 2003. Proceedings., pp.170-179, 2003.
DOI : 10.1109/CSAC.2003.1254322

C. P. Stoll, The cuckoos egg: Tracing a spy through the maze of computer espionage, 1989.

J. Voris, N. Boggs, and S. J. Stolfo, Lost in Translation: Improving Decoy Documents via Automated Translation, 2012 IEEE Symposium on Security and Privacy Workshops, pp.129-133, 2012.
DOI : 10.1109/SPW.2012.20

URL : http://ieee-security.org/TC/SPW2012/proceedings/4740a129.pdf

B. Whitham, Canary Files: Generating Fake Files to Detect Critical Data Loss from Complex Computer Networks, The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013, pp.170-179, 2013.

B. Whitham, Design requirements for generating deceptive content to protect document repositories, 2014.

J. Yuill, M. Zappe, D. Denning, and F. Feer, Honeyfiles: deceptive files for intrusion detection In: Information Assurance Workshop, Proceedings from the Fifth Annual IEEE SMC, pp.116-122, 2004.
DOI : 10.1109/iaw.2004.1437806