On Identification of Intrusive Applications: A Step Toward Heuristics-Based Adaptive Security Policy | IEEE Journals & Magazine | IEEE Xplore