1.
Maxim A. Parinov, Anna G. Sirotkina. Analysis of the Control Flow Graph to Detect Attacks at the Application by Verification its System Calls. IJAST [Internet]. 2020Jun.4 [cited 2024Apr.27];29(11s):1165 -173. Available from: http://sersc.org/journals/index.php/IJAST/article/view/20799