Vol-1524⫷ Vol-1525 ⫸Vol-1526
urn:nbn:de:0074-1525-0


Vol-1525/paper-14⫷Vol-1525/paper-15⫸Vol-1525/paper-16

Preventing malicious attacks by diversifying Linux shell commands