[1]
S. Y. Maturi, “Decoy Data Nexus: Graph-Based Integration and Analysis of Synthetic Honeypot Logs Through Structured Threat Intelligence”, IJCESEN, vol. 10, no. 4, Dec. 2024.