关注
Wael Khreich
标题
引用次数
引用次数
年份
A survey of techniques for event detection in twitter
F Atefeh, W Khreich
Computational Intelligence 31 (1), 132-164, 2015
9602015
A survey of techniques for incremental learning of HMM parameters
W Khreich, E Granger, A Miri, R Sabourin
Information Sciences 197, 105--130, 2012
1452012
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 43 (8), 2732-2752, 2010
1402010
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
1142017
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 45 (1), 208-230, 2012
792012
A host-based anomaly detection approach by representing system calls as states of kernel modules
SS Murtaza, W Khreich, A Hamou-Lhadj, M Couture
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
692013
On the memory complexity of the forward–backward algorithm
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition Letters 31 (2), 91-99, 2010
672010
Mining trends and patterns of software vulnerabilities
SS Murtaza, W Khreich, A Hamou-Lhadj, AB Bener
Journal of Systems and Software 117, 218-228, 2016
602016
Combining hidden markov models for improved anomaly detection
W Khreich, E Granger, R Sabourin, A Miri
2009 IEEE International Conference on Communications, 1-6, 2009
492009
Anomaly detection techniques based on kappa-pruned ensembles
MS Islam, W Khreich, A Hamou-Lhadj
IEEE Transactions on Reliability 67 (1), 212-229, 2018
432018
Combining heterogeneous anomaly detectors for improved software security
W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi
Journal of Systems and Software 137, 415-429, 2018
382018
A trace abstraction approach for host-based anomaly detection
SS Murtaza, W Khreich, A Hamou-Lhadj, S Gagnon
2015 IEEE symposium on computational intelligence for security and defense …, 2015
272015
Gender bias in text: Origin, taxonomy, and implications
J Doughman, W Khreich, M El Gharib, M Wiss, Z Berjawi
Proceedings of the 3rd Workshop on Gender Bias in Natural Language …, 2021
252021
Total ADS: Automated software anomaly detection system
SS Murtaza, A Hamou-Lhadj, W Khreich, M Couture
2014 IEEE 14th International Working Conference on Source Code Analysis and …, 2014
202014
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
182009
Fusion of biometric systems using boolean combination: an application to iris-based authentication
E Granger, W Khreich, R Sabourin, DO Gorodnichy
International journal of biometrics 4 (3), 291-315, 2012
162012
Boolean combination of classifiers in the ROC space
W Khreich, E Granger, A Miri, R Sabourin
2010 20th International Conference on Pattern Recognition, 4299-4303, 2010
142010
An international social inclusion index with application in the Organization for Economic Co-Operation and Development countries
Z Hassan, W Khreich, IH Osman
Decision Analytics Journal 3, 100047, 2022
122022
An anomaly detection system based on ensemble of detectors with effective pruning techniques
A Soudi, W Khreich, A Hamou-Lhadj
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
112015
Domain Adaptation Techniques for Machine Translation and their Evaluation in a Real-World Setting
B Sankaran, M Razmara, A Farzindar, W Khreich, F Popowich, A Sarkar
Advances in Artificial Intelligence, 158-169, 2012
92012
系统目前无法执行此操作,请稍后再试。
文章 1–20