9ZHUGE Jian-wei,Wu Zhi-fa,Zhang Fang-fang,et al.Use honeypot to exposure security threats in the Internet[C].In:Proceeding of 2005 China National Computer Conference,2005.
10Clifford Stoll.The cuckoo's egg:tracking a spy through the maze of computer espionage[C].The Bodley Head Ltd,1990.