L Shi, Y Li, T Liu, J Liu, B Shan,
H Chen - IEEE Access, 2019 - ieeexplore.ieee.org
Honeypot technology can be applied to efficiently attract attackers and exhaust their
resources. However, the traditional static honeypot is easy to be recognized by anti …