[1]
О. Лаврівська and Ю. Грицюк, “Using traps to protect network infrastructure from intruders’ attacks”, RADAP, no. 55, pp. 128-134, Dec. 2013.