(1)
Widodo, T.; Muhsina, E. A.; Sugiantoro, B. Honeypot Log Analysis As a Network Security Support. IJID 2013, 2, 8-12.