Author of the publication

An improved Hidden Markov Model for anomaly detection using frequent common patterns.

, , and . ICC, page 1113-1117. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Total ADS: Automated Software Anomaly Detection System., , , and . SCAM, page 83-88. IEEE Computer Society, (2014)SinCRY: A Preventive Defense Tool for Detecting Vulnerabilities in Java Applications Integrating Cryptographic Modules., , and . SoMeT, volume 303 of Frontiers in Artificial Intelligence and Applications, page 187-200. IOS Press, (2018)Towards a formal framework for evaluating the effectiveness of system diversity when applied to security., , and . CISDA, page 1-7. IEEE, (2012)An improved Hidden Markov Model for anomaly detection using frequent common patterns., , and . ICC, page 1113-1117. IEEE, (2012)On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies., , , and . CSMR, page 127-136. IEEE Computer Society, (2012)Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction., , , , , and . RACS, page 328-335. ACM, (2013)A host-based anomaly detection approach by representing system calls as states of kernel modules., , , and . ISSRE, page 431-440. IEEE Computer Society, (2013)Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model., , , and . JNW, 7 (2): 311-321 (2012)Monitoring system calls for anomaly detection in modern operating systems., , , , and . ISSRE (Supplemental Proceedings), page 19-20. IEEE Computer Society, (2013)On-device anomaly detection for resource-limited systems., , , , , and . SAC, page 548-554. ACM, (2015)