Login / Signup
Identifying malicious activities from system execution traces.
E. Aharoni
R. Peleg
S. Regev
T. Salman
Published in:
IBM J. Res. Dev. (2016)
Keyphrases
</>
execution traces
malicious activities
source code
identity theft
program comprehension
intrusion detection system
false positive rate
online social networks
database
data mining
information systems
case study
data processing
security issues
insider threat