Search alternatives:
attackers technical » attacker technical, attacks technical, tickers technical
world attackers » world attacks, world attack, force attackers
technical paper » technical papers

1
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Detection for Intrusion Prevention on the Network Card -- Defending Against Injection Attacks Through...

2
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks...