Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
Date first appeared online | 18/07/2015 |
DOI | 10.1016/j.compeleceng.2015.07.007 |
Authors | Shaikh S. |
Journal Name | Computers & Electrical Engineering |
Volume | 47 |