. Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots. Journal of Advances in Computer Research. 2012;3(1):65-80.