Login / Signup

A practical mimicry attack against powerful system-call monitors.

Chetan ParampalliR. SekarRob Johnson
Published in: AsiaCCS (2008)
Keyphrases
  • high level
  • user friendly
  • dos attacks
  • malicious users
  • data sets
  • data mining
  • social networks
  • practical problems
  • detection mechanism