Configuration Honeypots with an Emphasis on Logging of the Attacks and Redundancy | IEEE Conference Publication | IEEE Xplore