Fixed vs. variable-length patterns for detecting suspicious process behavior | doi.page