Honeypots in blackhat mode and its implications [computer security] | IEEE Conference Publication | IEEE Xplore