Login / Signup

Exploiting Execution Context for the Detection of Anomalous System Calls.

Darren MutzWilliam K. RobertsonGiovanni VignaRichard A. Kemmerer
Published in: RAID (2007)
Keyphrases