The Generation of Attack Signatures Based on Virtual Honeypots | IEEE Conference Publication | IEEE Xplore