[1]
I. Andrushchak, V. Kosheliuk, and I. Veremiy, “Cybersecurity deception technologies: integrating cowrie and ELK Stack to detect network attacks”, ISJEA, vol. 4, no. 6, pp. 1–14, Dec. 2025.