Wael Khreich
Title
Cited by
Cited by
Year
A survey of techniques for event detection in twitter
F Atefeh, W Khreich
Computational Intelligence 31 (1), 132-164, 2015
6302015
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 43 (8), 2732-2752, 2010
1132010
A survey of techniques for incremental learning of HMM parameters
W Khreich, E Granger, A Miri, R Sabourin
Information Sciences 197, 105--130, 2012
1042012
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 45 (1), 208-230, 2012
662012
On the memory complexity of the forward–backward algorithm
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition Letters 31 (2), 91-99, 2010
502010
A host-based anomaly detection approach by representing system calls as states of kernel modules
SS Murtaza, W Khreich, A Hamou-Lhadj, M Couture
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
452013
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
382017
Combining hidden markov models for improved anomaly detection
W Khreich, E Granger, R Sabourin, A Miri
2009 IEEE International Conference on Communications, 1-6, 2009
382009
Mining trends and patterns of software vulnerabilities
SS Murtaza, W Khreich, A Hamou-Lhadj, AB Bener
Journal of Systems and Software 117, 218-228, 2016
242016
A trace abstraction approach for host-based anomaly detection
SS Murtaza, W Khreich, A Hamou-Lhadj, S Gagnon
2015 IEEE Symposium on Computational Intelligence for Security and Defense …, 2015
172015
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
172009
Combining heterogeneous anomaly detectors for improved software security
W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi
Journal of Systems and Software 137, 415-429, 2018
162018
Total ADS: Automated software anomaly detection system
SS Murtaza, A Hamou-Lhadj, W Khreich, M Couture
2014 IEEE 14th International Working Conference on Source Code Analysis and …, 2014
152014
Anomaly detection techniques based on kappa-pruned ensembles
MS Islam, W Khreich, A Hamou-Lhadj
IEEE Transactions on Reliability 67 (1), 212-229, 2018
132018
Fusion of biometric systems using boolean combination: an application to iris-based authentication
E Granger, W Khreich, R Sabourin, DO Gorodnichy
International journal of biometrics 4 (3), 291-315, 2012
122012
Boolean combination of classifiers in the ROC space
W Khreich, E Granger, A Miri, R Sabourin
2010 20th International Conference on Pattern Recognition, 4299-4303, 2010
112010
An anomaly detection system based on ensemble of detectors with effective pruning techniques
A Soudi, W Khreich, A Hamou-Lhadj
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
102015
Domain Adaptation Techniques for Machine Translation and their Evaluation in a Real-World Setting
B Sankaran, M Razmara, A Farzindar, W Khreich, F Popowich, A Sarkar
Advances in Artificial Intelligence, 158-169, 2012
82012
Results from Evaluation of Three Commercial Off the shelf Face Recognition Systems on Chokepoint Dataset
E Granger, D Gorodnichy, E Choy, W Khreich, P Radtke, J Bergeron, ...
Canada Border Services Agency Ottawa ON Canada, 2014
4*2014
Monitoring system calls for anomaly detection in modern operating systems
S Eskandari, W Khreich, SS Murtaza, A Hamou-Lhadj, M Couture
2013 IEEE International Symposium on Software Reliability Engineering …, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20