Login / Signup
Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.
Nir Nissim
Yuval Lapidot
Aviad Cohen
Yuval Elovici
Published in:
Knowl. Based Syst. (2018)
Keyphrases
</>
virtual machine
data mining
object detection
data center
real time
knowledge discovery
e learning
data analysis
intrusion detection
frequent patterns