Identifying malicious activities from system execution traces

E. Aharoni, R. Peleg, S. Regev, T. Salman. Identifying malicious activities from system execution traces. IBM Journal of Research and Development, 60(4):5, 2016. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.