Journal article 567 views
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
Computers & Electrical Engineering, Volume: 47, Pages: 327 - 344
Swansea University Author: Siraj Shaikh
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1016/j.compeleceng.2015.07.007
Abstract
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
Published in: | Computers & Electrical Engineering |
---|---|
ISSN: | 0045-7906 |
Published: |
Elsevier BV
2015
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa61046 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
College: |
Faculty of Science and Engineering |
---|---|
Start Page: |
327 |
End Page: |
344 |