Fixed vs. variable-length patterns for detecting suspicious process behavior
- 1 January 1998
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 3 references indexed in Scilit:
- Computer immunologyCommunications of the ACM, 1997
- Intrusion detection via system call tracesIEEE Software, 1997
- String Searching AlgorithmsParallel Algorithms, 1994