“…The basic idea is that an attack will generate a different system calls graph and, therefore, the attack can be detected. Based on the system calls graph technique, there are studies that take into account the importance of the edges of the graph, which represent transitions between system calls of the application [2].…”