1.
An Approach to Conceal Honeypot from Attacker. IJARCS [Internet]. 2017 Jan. 13 [cited 2026 Feb. 22];3(7):290-6. Available from: https://www.ijarcs.info/index.php/Ijarcs/article/view/1397