AK Ghosh, C Michael, M Schatz - International Workshop on Recent …, 2000 - Springer
In practice, most computer intrusions begin by misusing programs in clever ways to obtain
unauthorized higher levels of privilege. One effective way to detect intrusive activity before …