Identifying malicious activities from system execution tracesEhud AharoniR. Peleget al.2016IBM J. Res. Dev