[1]
Kosheliuk, V. and Tulashvili, Y. 2025. Implementing Honeypots for Detecting Cyber Threats with AWS using the ELK. International Journal of Computing. 23, 4 (Jan. 2025), 618-624. DOI:https://doi.org/10.47839/ijc.23.4.3761.