Detecting intrusions using system calls: alternative data models | IEEE Conference Publication | IEEE Xplore