1.
Widodo T, Muhsina EA, Sugiantoro B. Honeypot Log Analysis as a Network Security Support. IJID [Internet]. 2013 May 26 [cited 2025 Jul. 13];2(1):8-12. Available from: https://journal.uin-suka.ac.id/saintek/ijid/article/view/02102