(1)
Using Traps to Protect Network Infrastructure from intruders’ Attacks. RADAP 2013, No. 55, 128-134. https://doi.org/10.20535/RADAP.2013.55.128-134.