APA (7th ed.) Citation

Azali, M. R. (2005). Using honeypots to detect internal attacks at FTMSK / Muhamad Rizal Azali.

Chicago Style (17th ed.) Citation

Azali, Muhamad Rizal. Using Honeypots to Detect Internal Attacks at FTMSK / Muhamad Rizal Azali. 2005.

MLA (8th ed.) Citation

Azali, Muhamad Rizal. Using Honeypots to Detect Internal Attacks at FTMSK / Muhamad Rizal Azali. 2005.

Warning: These citations may not always be 100% accurate.