Wael Khreich, D.Eng.

Affiliations: 
2011 Departement de genie de la production automatisee Ecole de Technologie Superieure (Canada) 
Area:
Artificial Intelligence, Computer Science, Electronics and Electrical Engineering
Google:
"Wael Khreich"

Parents

Sign in to add mentor
Robert Sabourin grad student 2011 Ecole de Technologie Superieure (Canada)
 (Towards adaptive anomaly detection systems using Boolean combination of hidden Markov models.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Islam MS, Khreich W, Hamou-Lhadj A. (2018) Anomaly Detection Techniques Based on Kappa-Pruned Ensembles Ieee Transactions On Reliability. 67: 212-229
Khreich W, Murtaza SS, Hamou-Lhadj A, et al. (2017) Combining heterogeneous anomaly detectors for improved software security Journal of Systems and Software. 137: 415-429
Khreich W, Khosravifar B, Hamou-Lhadj A, et al. (2017) An anomaly detection system based on variable N-gram features and one-class SVM Information & Software Technology. 91: 186-197
Murtaza SS, Khreich W, Hamou-Lhadj A, et al. (2016) Mining trends and patterns of software vulnerabilities Journal of Systems and Software. 117: 218-228
Atefeh F, Khreich W. (2015) A survey of techniques for event detection in Twitter Computational Intelligence. 31: 133-164
Soudi A, Khreich W, Hamou-Lhadj A. (2015) An Anomaly Detection System Based on Ensemble of Detectors with Effective Pruning Techniques Proceedings - 2015 Ieee International Conference On Software Quality, Reliability and Security, Qrs 2015. 109-118
Murtaza SS, Khreich W, Hamou-Lhadj A, et al. (2015) A trace abstraction approach for host-based anomaly detection 2015 Ieee Symposium On Computational Intelligence For Security and Defense Applications, Cisda 2015 - Proceedings. 170-177
Murtaza SS, Hamou-Lhadj A, Khreich W, et al. (2014) Total ADS: Automated software anomaly detection system Proceedings - 2014 14th Ieee International Working Conference On Source Code Analysis and Manipulation, Scam 2014. 83-88
Murtaza SS, Khreich W, Hamou-Lhadj A, et al. (2013) A host-based anomaly detection approach by representing system calls as states of kernel modules 2013 Ieee 24th International Symposium On Software Reliability Engineering, Issre 2013. 431-440
Granger E, Khreich W, Sabourin R, et al. (2012) Fusion of biometric systems using Boolean combination: An application to iris-based authentication International Journal of Biometrics. 4: 291-315
See more...