[1]
S. . Biswa, P. . Wangmo, T. . Rangdel, T. . Wangchuk, Y. . Tshering, and T. . Yangchen, “ Securing Network using Honeypots: A Comparative Study on Honeytrap and T-Pot”, JNEC-TRST, vol. 7, no. 1, pp. 12–20, Feb. 2025.