[1]
Widodo, T., Muhsina, E.A. and Sugiantoro, B. 2013. Honeypot Log Analysis as a Network Security Support. IJID (International Journal on Informatics for Development). 2, 1 (May 2013), 8–12. DOI:https://doi.org/10.14421/ijid.2013.02102.