(1)
Maxim A. Parinov, Anna G. Sirotkina. Analysis of the Control Flow Graph to Detect Attacks at the Application by Verification Its System Calls. IJAST 2020, 29, 1483 - 1491.