Feature Extraction Techniques for Malicious System Calls | IEEE Conference Publication | IEEE Xplore