PUBLICATION: A pointillist approach for comparing honeypots
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in DIMVA 2005, Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 7-8, 2005, Vienna, Austria and is available at : http://dx.doi.org/10.1007/11506881_4