A practical survey on faster and lighter transformers

Q Fournier, GM Caron, D Aloise - ACM Computing Surveys, 2023 - dl.acm.org
Recurrent neural networks are effective models to process sequences. However, they are
unable to learn long-term dependencies because of their inherent sequential nature. As a …

Transformers and large language models for efficient intrusion detection systems: A comprehensive survey

H Kheddar - arXiv preprint arXiv:2408.07583, 2024 - arxiv.org
With significant advancements in Transformers LLMs, NLP has extended its reach into many
research fields due to its enhanced capabilities in text generation and user interaction. One …

Language models for novelty detection in system call traces

Q Fournier, D Aloise, LR Costa - arXiv preprint arXiv:2309.02206, 2023 - arxiv.org
Due to the complexity of modern computer systems, novel and unexpected behaviors
frequently occur. Such deviations are either normal occurrences, such as software updates …

DongTing: a large-scale dataset for anomaly detection of the Linux kernel

G Duan, Y Fu, M Cai, H Chen, J Sun - Journal of Systems and Software, 2023 - Elsevier
Host-based intrusion detection systems (HIDS) can automatically identify adversarial
applications by learning models from system events that represent normal system behaviors …

Anomaly detection in microservice environments using distributed tracing data analysis and NLP

I Kohyarnejadfard, D Aloise, SV Azhari… - Journal of Cloud …, 2022 - Springer
In recent years DevOps and agile approaches like microservice architectures and
Continuous Integration have become extremely popular given the increasing need for …

Accurate Path Prediction of Provenance Traces

R Ahmad, HY Jung, Y Nakamura, T Malik - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
Several security and workflow applications require provenance information at the operating
system level for diagnostics. The resulting provenance traces are often more informative if …

Anomalous energy detection for resource-constrained embedded systems using tracing data analysis

AS Bushehri, S Keivanpour, M Azam… - … Computer and Energy …, 2021 - ieeexplore.ieee.org
Since the multi-sensor embedded systems are spread all over the urban and suburban
areas, there should be a real-time performance analysis framework to monitor the energy …

Toward Adaptive Tracing: Efficient System Behavior Analysis using Language Models

K Darvishi, M Noferesti, N Ezzati-Jivan - … of the 2024 ACM/IEEE 44th …, 2024 - dl.acm.org
Tracing, a technique essential for unraveling the complexities of computer systems'
behavior, involves the organized collection of low-level events, enabling anomaly …

Timing Behavior Characterization of Critical Real-Time Systems through Hybrid Timing Analysis

S Barone, V Casola, S Della Torca… - 2023 7th International …, 2023 - ieeexplore.ieee.org
The spread of computing-systems, especially the realtime embedded ones, is rapidly
growing in the last years, since they find usage in numerous fields of application, including …

[PDF][PDF] Investigation of Transformers and Other Machine Learning Techniques for Health Data Classification

L Yamazaki - 2024 - jewlscholar.mtsu.edu
I am particularly grateful to the committee members Dr. Arpan Sainju and Dr Yeqian Liu for
their time, support, and valuable advice. Their insights and feedback have been crucial in …