Inproceedings,

Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?

, and .
PST, page 213-223. IEEE Computer Society, (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews