Wael Khreich, D.Eng.
Affiliations: | 2011 | Departement de genie de la production automatisee | Ecole de Technologie Superieure (Canada) |
Area:
Artificial Intelligence, Computer Science, Electronics and Electrical EngineeringGoogle:
"Wael Khreich"Parents
Sign in to add mentorRobert Sabourin | grad student | 2011 | Ecole de Technologie Superieure (Canada) | |
(Towards adaptive anomaly detection systems using Boolean combination of hidden Markov models.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Islam MS, Khreich W, Hamou-Lhadj A. (2018) Anomaly Detection Techniques Based on Kappa-Pruned Ensembles Ieee Transactions On Reliability. 67: 212-229 |
Khreich W, Murtaza SS, Hamou-Lhadj A, et al. (2017) Combining heterogeneous anomaly detectors for improved software security Journal of Systems and Software. 137: 415-429 |
Khreich W, Khosravifar B, Hamou-Lhadj A, et al. (2017) An anomaly detection system based on variable N-gram features and one-class SVM Information & Software Technology. 91: 186-197 |
Murtaza SS, Khreich W, Hamou-Lhadj A, et al. (2016) Mining trends and patterns of software vulnerabilities Journal of Systems and Software. 117: 218-228 |
Atefeh F, Khreich W. (2015) A survey of techniques for event detection in Twitter Computational Intelligence. 31: 133-164 |
Soudi A, Khreich W, Hamou-Lhadj A. (2015) An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques Proceedings - 2015 Ieee International Conference On Software Quality, Reliability and Security, Qrs 2015. 109-118 |
Murtaza SS, Khreich W, Hamou-Lhadj A, et al. (2015) A trace abstraction approach for host-based anomaly detection 2015 Ieee Symposium On Computational Intelligence For Security and Defense Applications, Cisda 2015 - Proceedings. 170-177 |
Murtaza SS, Hamou-Lhadj A, Khreich W, et al. (2014) Total ADS: Automated software anomaly detection system Proceedings - 2014 14th Ieee International Working Conference On Source Code Analysis and Manipulation, Scam 2014. 83-88 |
Murtaza SS, Khreich W, Hamou-Lhadj A, et al. (2013) A host-based anomaly detection approach by representing system calls as states of kernel modules 2013 Ieee 24th International Symposium On Software Reliability Engineering, Issre 2013. 431-440 |
Granger E, Khreich W, Sabourin R, et al. (2012) Fusion of biometric systems using Boolean combination: An application to iris-based authentication International Journal of Biometrics. 4: 291-315 |