Evaluation of control flow traces in software applications for intrusion detection | IEEE Conference Publication | IEEE Xplore