Should we share honeypot information for security management? | IEEE Conference Publication | IEEE Xplore