- Changing the game: The art of deceiving sophisticated attackers
- Applying Deception Mechanisms for Detecting Sophisticated Cyber Attacks
- Proactive detection of security incidents II - Honeypots
- Designing Adaptive Deception Strategies
- Goal-Driven Deception Tactics Design
- Automating the Generation of Enticing Text Content for High-Interaction Honeyfiles
- Canary Files: generating fake files to detect critical data loss from complex computer networks
- Baiting Inside Attackers Using Decoy Documents
- HoneyGen: An automated honeytokens generator
- Detecting Kerberoasting Activity Part 2 – Creating a Kerberoast Service Account Honeypot
- Enabling an Anatomic View to Investigate Honeypot Systems: A Survey
- A Survey on Honeypot Software and Data Analysis
- Detecting Mimikatz Use On Your Network
- Busting the Honeypot – Is there really a way for attackers to detect deception
- High Interaction Honeypots with Sysdig and Falco
- Catching attackers with go-audit and a logging pipeline
- Reddit/honeypot
- Early Warning Detectors Using AWS Access Keys as Honeytokens
- Breach Detection At Scale With PROJECT SPACECRAB
- AWS API key Canarytoken
- Systems and methods for the detection of advanced attackers using client side honeytokens (Patent)