[1]
S. M. M. K. K. J., “Application of Honeypot in Cloud Security: A Review”, ijfrcsce, vol. 4, no. 6, pp. 63–65, Jun. 2018.