[1]
W. B. Ahadin, S. Syaifuddin, and Z. Sari, “Visualisasi Data Attacker Activity Log Portable Modern Honey Network”, JR, vol. 4, no. 1, Jan. 2024.