Using system call information to reveal hidden attack manifestations | IEEE Conference Publication | IEEE Xplore