Slide
Centre Interdisciplinaire
de Recherche et d’Innovation
en Cybersécurité et Société

Show all

1.

Murtaza, S. S.; Khreich, W.; Hamou-Lhadj, A.; Gagnon, S.

A trace abstraction approach for host-based anomaly detection Proceedings Article

In: 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2015 - Proceedings, pp. 170–177, Institute of Electrical and Electronics Engineers Inc., 2015, ISBN: 978-146737557-3 (ISBN), (Journal Abbreviation: IEEE Symp. Comput. Intell. Secur. Def. Appl., CISDA - Proc.).

Abstract | Links | BibTeX | Tags: Abstracting, Abstraction techniques, Alarm systems, Anomaly detection, Anomaly detection systems, Anomaly detector, Artificial intelligence, Chemical detection, Computer programming languages, Distributed computer systems, Errors, Hidden Markov models, Host-based Anomaly Detection System, Markov processes, Signal detection, Software dependability, Software security, System call traces, Time delay, Time delay embedding, Trace analysis, Trace Analysis and Abstraction

Share this page