1.
An Approach to Conceal Honeypot from Attacker. IJARCS. 2017;3(7):290-296. doi:10.26483/ijarcs.v3i7.1397