Identifying malicious activities from system execution traces

E. Aharoni, R. Peleg, S. Regev, T. Salman. Identifying malicious activities from system execution traces. IBM Journal of Research and Development, 60(4):5, 2016. [doi]

Abstract

Abstract is missing.