1. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
2. COVERAGE: Detecting and Reacting to Worm Epidemics Using Cooperation and Validation Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science
3. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
4. Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation Anagnostakis, Kostas G.; Ioannidis, Sotiris; Keromytis, Angelos D.; Greenwald, Michael B. 2006 Articles Computer science
5. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
6. Detecting Targeted Attacks Using Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Xinidis, Konstantinos; Markatos, Evangelos; Keromytis, Angelos D. 2005 Articles Computer science
7. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
8. Managing Access Control in Large Scale Heterogeneous Networks Keromytis, Angelos D.; Anagnostakis, Kostas G.; Ioannidis, Sotiris; Greenwald, Michael; Smith, Jonathan M. 2003 Articles Computer science
9. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
10. The Price of Safety in an Active Network Alexander, D. Scott; Menage, Paul B.; Keromytis, Angelos D.; Arbaugh, William A.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2001 Articles Computer science