1.
Biswa S, Wangmo P, Rangdel T, Wangchuk T, Tshering Y, Yangchen T. Securing Network using Honeypots: A Comparative Study on Honeytrap and T-Pot. JNEC-TRST [Internet]. 2025 Feb. 28 [cited 2025 Apr. 3];7(1):12-20. Available from: https://trst.jnec.edu.bt/index.php/thruelrigsartoed/article/view/24