Follow
Wael Khreich
Title
Cited by
Cited by
Year
A survey of techniques for event detection in twitter
F Atefeh, W Khreich
Computational Intelligence 31 (1), 132-164, 2015
9692015
A survey of techniques for incremental learning of HMM parameters
W Khreich, E Granger, A Miri, R Sabourin
Information Sciences 197, 105--130, 2012
1472012
Iterative Boolean combination of classifiers in the ROC space: An application to anomaly detection with HMMs
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 43 (8), 2732-2752, 2010
1412010
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
1192017
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition 45 (1), 208-230, 2012
802012
A host-based anomaly detection approach by representing system calls as states of kernel modules
SS Murtaza, W Khreich, A Hamou-Lhadj, M Couture
2013 IEEE 24th International Symposium on Software Reliability Engineering …, 2013
702013
On the memory complexity of the forward–backward algorithm
W Khreich, E Granger, A Miri, R Sabourin
Pattern Recognition Letters 31 (2), 91-99, 2010
692010
Mining trends and patterns of software vulnerabilities
SS Murtaza, W Khreich, A Hamou-Lhadj, AB Bener
Journal of Systems and Software 117, 218-228, 2016
632016
Combining hidden markov models for improved anomaly detection
W Khreich, E Granger, R Sabourin, A Miri
2009 IEEE International Conference on Communications, 1-6, 2009
502009
Anomaly detection techniques based on kappa-pruned ensembles
MS Islam, W Khreich, A Hamou-Lhadj
IEEE Transactions on Reliability 67 (1), 212-229, 2018
442018
Combining heterogeneous anomaly detectors for improved software security
W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi
Journal of Systems and Software 137, 415-429, 2018
382018
Gender bias in text: Origin, taxonomy, and implications
J Doughman, W Khreich, M El Gharib, M Wiss, Z Berjawi
Proceedings of the 3rd Workshop on Gender Bias in Natural Language …, 2021
282021
A trace abstraction approach for host-based anomaly detection
SS Murtaza, W Khreich, A Hamou-Lhadj, S Gagnon
2015 IEEE symposium on computational intelligence for security and defense …, 2015
282015
Total ADS: Automated software anomaly detection system
SS Murtaza, A Hamou-Lhadj, W Khreich, M Couture
2014 IEEE 14th International Working Conference on Source Code Analysis and …, 2014
212014
A comparison of techniques for on-line incremental learning of HMM parameters in anomaly detection
W Khreich, E Granger, A Miri, R Sabourin
2009 IEEE Symposium on Computational Intelligence for Security and Defense …, 2009
182009
Fusion of biometric systems using boolean combination: an application to iris-based authentication
E Granger, W Khreich, R Sabourin, DO Gorodnichy
International journal of biometrics 4 (3), 291-315, 2012
162012
Boolean combination of classifiers in the ROC space
W Khreich, E Granger, A Miri, R Sabourin
2010 20th International Conference on Pattern Recognition, 4299-4303, 2010
142010
An international social inclusion index with application in the Organization for Economic Co-Operation and Development countries
Z Hassan, W Khreich, IH Osman
Decision Analytics Journal 3, 100047, 2022
122022
An anomaly detection system based on ensemble of detectors with effective pruning techniques
A Soudi, W Khreich, A Hamou-Lhadj
2015 IEEE International Conference on Software Quality, Reliability and …, 2015
122015
Gender bias in text: Labeled datasets and lexicons
J Doughman, W Khreich
arXiv preprint arXiv:2201.08675, 2022
102022
The system can't perform the operation now. Try again later.
Articles 1–20