[1]
Maxim A. Parinov, Anna G. Sirotkina, “Analysis of the Control Flow Graph to Detect Attacks at the Application by Verification its System Calls”, IJAST, vol. 29, no. 11s, pp. 1165 - 1173, Jun. 2020.