Intrusion detection via system call traces | IEEE Journals & Magazine | IEEE Xplore