A Methodology for Runtime Detection and Extraction of Threat Patterns | Publicación