Technical & Research Reports
ICS-FORTH Technical Reports
- Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E.P., & Keromytis, A.D. (2005). Detecting Targeted Attacks Using Shadow Honeypots. 2005.TR348_Targeted_Attacks_Shadow_Honeypots.pdf





