Oualid Koucham

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
We deal in this paper with anomaly-based host intrusion detection using system call traces produced by a host's kernel. In addition to the sequences, we leverage system call arguments, contextual information and domain level knowledge to produce clusters for each individual system call. These clusters are then used to rewrite process sequences of system(More)
  • 1