@dblp

Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies.

, , and . CSFW, page 190-201. IEEE Computer Society, (1998)

Links and resources

Tags