Identifying malicious activities from system execution tracesEhud AharoniR. Peleget al.2016IBM J. Res. DevPaper
Secure yet usable: Protecting servers and Linux containersS. BarlevZ. Basilet al.2016IBM J. Res. DevPaper