, Honeyprocs: Going beyond honeyfiles for deception on endpoints, pp.2019-2021

M. Amiri and L. Mohammad-khanli, Survey on prediction models of applications for resources provisioning in cloud, J. Netw. Comput. Appl, vol.82, pp.93-113, 2017.

J. Butler, J. L. Undercoffer, and J. Pinkston, Hidden processes: the implication for intrusion detection, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, pp.116-121, 2003.

X. Chen, J. Andersen, Z. M. Mao, M. Bailey, and J. Nazario, Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware, Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, pp.177-186, 2008.

I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning, 2016.

S. T. Jones, A. C. Arpaci-dusseau, and R. H. Arpaci-dusseau, Vmm-based hidden process detection and identification using lycosid, Proceedings of the Fourth ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp.91-100, 2008.

Y. Kwon, S. Lee, H. Yi, D. Kwon, S. Yang et al., Mantis: Efficient predictions of execution time, energy usage, memory usage and network usage on smart mobile devices, IEEE Transactions on Mobile Computing, vol.14, issue.10, pp.2059-2072, 2015.

J. Lange, F. Iwanitz, and T. Burke, OPC -From Data Access to Unified Architecture. VDE VERLAG GMBH, 2010.

T. Li, J. Tang, and J. Xu, Performance modeling and predictive scheduling for distributed stream data processing, IEEE Transactions on Big Data, vol.2, issue.4, pp.353-364, 2016.

A. Matsunaga and J. A. Fortes, On the use of machine learning to predict the time and resources consumed by applications, Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.495-504, 2010.

T. Miu and P. Missier, Predicting the execution time of workflow activities based on their input features, Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis, pp.64-72, 2012.

I. Pietri, G. Juve, E. Deelman, and R. Sakellariou, A performance model to estimate execution time of scientific workflows on the cloud, 9th Workshop on Workflows in Support of Large-Scale Science, pp.11-19, 2014.

T. Raffetseder, C. Kruegel, and E. Kirda, Detecting system emulators, Proceedings of the 10th International Security Conference, pp.1-18, 2007.

J. Rrushi, Phantom i/o projector: Entrapping malware on machines in production, 12th International Conference on Malicious and Unwanted Software (MAL-WARE), pp.57-66, 2017.

J. Rrushi, Dnic architectural developments for 0-knowledge detection of opc malware, IEEE Transactions on Dependable and Secure Computing, 2018.

W. J. Tsaur, Y. C. Chen, and B. Y. Tsai, A new windows driver-hidden rootkit based on direct kernel object manipulation, Algorithms and Architectures for Parallel Processing, pp.202-213, 2009.