Detecting past and present intrusions through vulnerability-specific predicates. In: (2005)

by A Joshi, S T King, G W Dunlap, P M Chen
Venue:Proceedings of the twentieth ACM symposium on Operating systems principles. SOSP ’05.