Intrusion detection using signatures extracted from execution profiles | IEEE Conference Publication | IEEE Xplore