Detecting Windows Based Exploit Chains by Means of Event Correlation and Process Monitoring

Romy