Author:
Khreich Wael,Murtaza Syed Shariyar,Hamou-Lhadj Abdelwahab,Talhi Chamseddine
Subject
Hardware and Architecture,Information Systems,Software
Reference70 articles.
1. A maximization technique occuring in the statistical analysis of probabilistic functions of Markov chains;Baum;Ann. Math. Stat.,1970
2. Dataflow anomaly detection;Bhatkar,2006
3. A quantitative study of accuracy in system call-based malware detection;Canali,2012
4. System call-based detection of malicious processes;Canzanese,2015
5. Non-control-data attacks are realistic threats;Chen,2005
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献