Login / Signup

Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining.

Nir NissimYuval LapidotAviad CohenYuval Elovici
Published in: Knowl. Based Syst. (2018)
Keyphrases
  • virtual machine
  • data mining
  • object detection
  • data center
  • real time
  • knowledge discovery
  • e learning
  • data analysis
  • intrusion detection
  • frequent patterns