[1]
“Honey Encryption Techniques: Strengths, Limitations, and Challenges ”, Al-Mansour J., vol. 42, no. 1, pp. 12–28, Aug. 2025, Accessed: Apr. 16, 2026. [Online]. Available: https://www.journal.muc.edu.iq/journal/article/view/669