4.
Jorquera Valero J.M., Pérez M., Huertas A., Martinez Perez G., Identification and classification of cyber threats through SSH honeypot systems [w:] Gupta B.B., Srinivasagopalan S., Handbook of Research on Intrusion Detection Systems, Hershey, PA 2020.