1. Detecting Targeted Attacks Using Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Xinidis, Konstantinos; Markatos, Evangelos; Keromytis, Angelos D. 2005 Articles Computer science