Holz, ThorstenDittmann, Jana2019-08-262019-08-2620063-88579-171-4https://dl.gi.de/handle/20.500.12116/24800enLearning more about attack patterns with honeypotsText/Conference Paper1617-5468