Showing results for "25th Annual Computer Security Applications Conference" 1-1 of 1
The publications on this page are generated nightly from the NCSU Library's Scholarly Publications Repository. This repository is by no means a fully comprehensive listing of publications. Publications can be added to the repository manually by visiting the Publications Repository Submission Form.
|Identification of bot commands by run-time execution monitoring||25th Annual Computer Security Applications Conference, ) (pp. 321-330).||2009|