Identifying malicious activities from system execution traces

E. Aharoni, R. Peleg, S. Regev, T. Salman. Identifying malicious activities from system execution traces. IBM Journal of Research and Development, 60(4):5, 2016. [doi]

@article{AharoniPRS16,
  title = {Identifying malicious activities from system execution traces},
  author = {E. Aharoni and R. Peleg and S. Regev and T. Salman},
  year = {2016},
  doi = {10.1147/JRD.2016.2559358},
  url = {http://dx.doi.org/10.1147/JRD.2016.2559358},
  researchr = {https://researchr.org/publication/AharoniPRS16},
  cites = {0},
  citedby = {0},
  journal = {IBM Journal of Research and Development},
  volume = {60},
  number = {4},
  pages = {5},
}