E. Aharoni, R. Peleg, S. Regev, T. Salman. Identifying malicious activities from system execution traces. IBM Journal of Research and Development, 60(4):5, 2016. [doi]
No references recorded for this publication.
No citations of this publication recorded.