- Using Honeypots for Network Intrusion Detection [https://www.hhs.gov/sites/default/files/using-honeypots-network-intrusion-detection.pdf]
- paralax/awesome-honeypots [https://github.com/paralax/awesome-honeypots]
- A comprehensive survey on cyber deception techniques to improve honeypot performance [https://www.sciencedirect.com/science/article/pii/S0167404824000932?via%3Dihub]
- Honeypots and Honeyfiles [https://ransomware.org/how-to-prevent-ransomware/threat-hunting/honeypots-and-honeyfiles/]
- Honeypots for Internet of Things Research: An Effective Mitigation Tool [https://csl.fiu.edu/wp-content/uploads/2023/06/javier_survey.pdf]
- Honey Files [https://techexamprep.com/sec_plus/architecture_and_design/enterprise_env/deception_and_disruption/honeyfiles/index.html]
- Honeyfiles: Deceptive Files for Intrusion Detection [https://faculty.nps.edu/dedennin/publications/honeyfiles.pdf]
- Honey File Monitoring [https://cybersecthreat.com/2020/07/08/honey-file-security-monitoring/]
- Using Windows File Auditing to Detect Honeyfile Access [https://labs.withsecure.com/publications/using-windows-file-auditing-to-detect-honeyfile-access]
- Rapid7: Honey Files [https://docs.rapid7.com/insightidr/honey-files/]
- How to best deploy honey files? [https://discuss.rapid7.com/t/how-to-best-deploy-honey-files/3659/2]