M Haney - Critical Infrastructure Protection XIII: 13th IFIP WG …, 2019 - Springer
Honeypots and related deception technologies have long been used to capture and study
malicious activity in networks. However, clear requirements for developing effective …