Detecting past and present intrusions through vulnerability-specific predicates (2005)

by A Joshi, S T King, G W Dunlap, P M Chen
Venue:In Proceedings of the 20th ACM Symposium on Operating Systems Principles (Brighton, United Kingdom