“An Approach to Conceal Honeypot from Attacker” (2017) International Journal of Advanced Research in Computer Science, 3(7), pp. 290–296. doi:10.26483/ijarcs.v3i7.1397.