Biswa, Sandip, Pema Wangmo, Tshoney Rangdel, Tashi Wangchuk, Younten Tshering, and Tashi Yangchen. “ Securing Network Using Honeypots: A Comparative Study on Honeytrap and T-Pot”. JNEC Thruel Rig Sar Toed 7, no. 1 (February 28, 2025): 12–20. Accessed April 3, 2025. https://trst.jnec.edu.bt/index.php/thruelrigsartoed/article/view/24.