[1]
T. Widodo, E. A. Muhsina, and B. Sugiantoro, “Honeypot Log Analysis as a Network Security Support”, IJID, vol. 2, no. 1, pp. 8–12, May 2013.