[1]
D. S., “Network Based Intrusion Detection Using Honey pot Deception”, IJRITCC, vol. 2, no. 4, pp. 805–810, Apr. 2014.