“An Approach to Conceal Honeypot from Attacker”. 2017. International Journal of Advanced Research in Computer Science 3 (7): 290-96. https://doi.org/10.26483/ijarcs.v3i7.1397.