E. Aharoni, R. Peleg, S. Regev, T. Salman. Identifying malicious activities from system execution traces. IBM Journal of Research and Development, 60(4):5, 2016. [doi]
@article{AharoniPRS16, title = {Identifying malicious activities from system execution traces}, author = {E. Aharoni and R. Peleg and S. Regev and T. Salman}, year = {2016}, doi = {10.1147/JRD.2016.2559358}, url = {http://dx.doi.org/10.1147/JRD.2016.2559358}, researchr = {https://researchr.org/publication/AharoniPRS16}, cites = {0}, citedby = {0}, journal = {IBM Journal of Research and Development}, volume = {60}, number = {4}, pages = {5}, }