On Recognizing Virtual Honeypots and Countermeasures | IEEE Conference Publication | IEEE Xplore