Login / Signup
Automated detection of vulnerabilities in privileged programs by execution monitoring.
Calvin Ko
George Fink
Karl N. Levitt
Published in:
ACSAC (1994)
Keyphrases
</>
automated detection
automated analysis
control flow
program execution
lung cancer
plan execution
information security
ultrasonic images
real time
monitoring system
database transactions
security issues
application programs
breast tumors
data mining
anomaly detection