[1]
D. Mashao and C. Harley, “Cyber Attack Pattern Analysis Based on Geo-location and Time: A Case Study of Firewall and IDS/IPS Logs”, J. Curr. Res. Blockchain., vol. 2, no. 1, pp. 28–40, Mar. 2025.