1.
Kosheliuk V, Tulashvili Y. Implementing Honeypots for Detecting Cyber Threats with AWS using the ELK. IJC [Internet]. 2025Jan.12 [cited 2025Jan.21];23(4):618-24. Available from: https://computingonline.net/computing/article/view/3761