Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining

Nir Nissim, Yuval Lapidot, Aviad Cohen, Yuval Elovici. Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining. Knowl.-Based Syst., 153:147-175, 2018. [doi]

@article{NissimLCE18,
  title = {Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining},
  author = {Nir Nissim and Yuval Lapidot and Aviad Cohen and Yuval Elovici},
  year = {2018},
  doi = {10.1016/j.knosys.2018.04.033},
  url = {https://doi.org/10.1016/j.knosys.2018.04.033},
  researchr = {https://researchr.org/publication/NissimLCE18},
  cites = {0},
  citedby = {0},
  journal = {Knowl.-Based Syst.},
  volume = {153},
  pages = {147-175},
}