1.
Maxim A. Parinov, Anna G. Sirotkina. Analysis of the Control Flow Graph to Detect Attacks at the Application by Verification its System Calls. IJAST [Internet]. 2020May5 [cited 2024Apr.28];29(9s):1483 -1491. Available from: http://sersc.org/journals/index.php/IJAST/article/view/13616