Zulkurnain, N. F., Rebitanim, A. F., & Abdul Malik, N. (2018). Analysis of THUG: A low-interaction client honeypot to identify malicious websites and malwares. IEEE.
Chicago Style (17th ed.) CitationZulkurnain, Nurul Fariza, Azli Fitri Rebitanim, and Noreha Abdul Malik. Analysis of THUG: A Low-interaction Client Honeypot to Identify Malicious Websites and Malwares. IEEE, 2018.
MLA (8th ed.) CitationZulkurnain, Nurul Fariza, et al. Analysis of THUG: A Low-interaction Client Honeypot to Identify Malicious Websites and Malwares. IEEE, 2018.
Warning: These citations may not always be 100% accurate.