Detecting targeted attacks using shadow honeypots,” ICS-FORTH, (2005)

by K Anagnostakis, S Sidiroglou, P Akritidis, K Xinidis, E Markatos, A Keromytis