Analysis of attackers against windows emulating honeypots in various types of networks and regions | IEEE Conference Publication | IEEE Xplore