Return to Article Details Cybersecurity deception technologies: integrating cowrie and ELK Stack to detect network attacks Download Download PDF