Search alternatives:
attack technical » attacks technical, attacker technical, stack technical
technical paper » technical papers
world attack » world attacks, worm attack, world atlas

1
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Detection for Intrusion Prevention on the Network Card -- Defending Against Injection Attacks Through...

2
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks...