(2012) ‘Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots’, Journal of Advances in Computer Research, 3(1), pp. 65-80. doi: