[1]
Maxim A. Parinov, Anna G. Sirotkina, “Analysis of the Control Flow Graph to Detect Attacks at the Application by Verification its System Calls”, IJAST, vol. 29, no. 9s, pp. 1483 - 1491, May 2020.