Guaranteed intrusion removal from monitored distributed applications | IEEE Conference Publication | IEEE Xplore