Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot | IEEE Conference Publication | IEEE Xplore