[1]
V. Kosheliuk and Y. Tulashvili, “Implementing Honeypots for Detecting Cyber Threats with AWS using the ELK”, IJC, vol. 23, no. 4, pp. 618-624, Jan. 2025.