2004 | ||
---|---|---|
2 | EE | Mark Foster, Joseph N. Wilson, Shigang Chen: Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. ISC 2004: 183-194 |
1 | EE | Mark Foster, Joseph N. Wilson: Process Forensics: A Pilot Study on the Use of Checkpointing Technology in Computer Forensics. IJDE 3(1): (2004) |
1 | Shigang Chen | [2] |
2 | Joseph N. Wilson | [1] [2] |