Honeypot Network Configuration through Cyberattack Patterns | IEEE Conference Publication | IEEE Xplore