1. P. Akritidis, K. G. Anagnostakis, and E. P. Markatos. Efficient content based worm detection. In Proceedings of the 40th IEEE International Conference on Communications (ICC), 2005.
2. K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In Proceedings of the 14th USENIX Security Symposium, pp. 129–144, August 2005.
3. S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hit list worms using network address space randomization. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pp. 30–40, November 2005.
4. S. Antonatos, K. G. Anagnostakis and E. P. Markatos. Honey@home: A new approach to large-scale threat monitoring. To appear in the Proceedings of the 5th ACM Workshop on Recurring Malcode (WORM), November 2007.
5. M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The internet motion sensor: A distributed blackhole monitoring system. In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS), pp. 167–179, February 2005a.