, Honeyprocs: Going beyond honeyfiles for deception on endpoints, pp.2019-2021
Survey on prediction models of applications for resources provisioning in cloud, J. Netw. Comput. Appl, vol.82, pp.93-113, 2017. ,
Hidden processes: the implication for intrusion detection, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, pp.116-121, 2003. ,
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware, Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, pp.177-186, 2008. ,
Deep Learning, 2016. ,
Vmm-based hidden process detection and identification using lycosid, Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp.91-100, 2008. ,
Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices, IEEE Transactions on Mobile Computing, vol.14, issue.10, pp.2059-2072, 2015. ,
OPC -From Data Access to Unified Architecture. VDE VERLAG GMBH, 2010. ,
Performance modeling and predictive scheduling for distributed stream data processing, IEEE Transactions on Big Data, vol.2, issue.4, pp.353-364, 2016. ,
On the use of machine learning to predict the time and resources consumed by applications, Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.495-504, 2010. ,
Predicting the execution time of workflow activities based on their input features, Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, pp.64-72, 2012. ,
A performance model to estimate execution time of scientific workflows on the cloud, 9th Workshop on Workflows in Support of Large-Scale Science, pp.11-19, 2014. ,
Detecting system emulators, Proceedings of the 10th International Security Conference, pp.1-18, 2007. ,
Phantom i/o projector: Entrapping malware on machines in production, 12th International Conference on Malicious and Unwanted Software (MAL-WARE), pp.57-66, 2017. ,
Dnic architectural developments for 0-knowledge detection of opc malware, IEEE Transactions on Dependable and Secure Computing, 2018. ,
A new windows driver-hidden rootkit based on direct kernel object manipulation, Algorithms and Architectures for Parallel Processing, pp.202-213, 2009. ,