Azali, M. R. (2005). Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali.
Chicago Style (17th ed.) CitationAzali, Muhamad Rizal. Using Honeypots to Detect Internal Attacks at FTMSK / Muhamad Rizal Azali. 2005.
MLA (8th ed.) CitationAzali, Muhamad Rizal. Using Honeypots to Detect Internal Attacks at FTMSK / Muhamad Rizal Azali. 2005.
Warning: These citations may not always be 100% accurate.