[1]
“Using traps to protect network infrastructure from intruders’ attacks”, RADAP, no. 55, pp. 128–134, Dec. 2013, doi: 10.20535/RADAP.2013.55.128-134.