Search alternatives:
attacker technical » attackers technical, attacks technical, attacker techniques
technical paper » technical papers
world attacker » world attack, world attacks, word attack

1
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Detection for Intrusion Prevention on the Network Card -- Defending Against Injection Attacks Through...

2
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks...