Identifying malicious activities from system execution traces | IBM Journals & Magazine | IEEE Xplore