Search alternatives:
technical paper » technical papers
word attack » world attack, world attacks, worm attacks
work attack » world attack, worm attacks, work attract

1
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Policy -- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks...

2
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Algorithms for Wireless Sensor Networks -- Detection and Mitigation of Attacks by Colluding Misbehaving Nodes...