Effective network security monitoring: from attribution to target-centric monitoring
Date first appeared online | 06/06/2015 |
DOI | 10.1007/s11235-015-0071-0 |
Authors | Shaikh S. |
Journal Name | Telecommunication Systems |
Volume | 62 |
Date first appeared online | 06/06/2015 |
DOI | 10.1007/s11235-015-0071-0 |
Authors | Shaikh S. |
Journal Name | Telecommunication Systems |
Volume | 62 |