An Approach to Conceal Honeypot from Attacker. (2017). International Journal of Advanced Research in Computer Science, 3(7), 290-296. https://doi.org/10.26483/ijarcs.v3i7.1397