Journal article 1037 views
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
Computers & Electrical Engineering, Volume: 47, Pages: 327 - 344
Swansea University Author:
Siraj Shaikh
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1016/j.compeleceng.2015.07.007
Abstract
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
| Published in: | Computers & Electrical Engineering |
|---|---|
| ISSN: | 0045-7906 |
| Published: |
Elsevier BV
2015
|
| Online Access: |
Check full text
|
| URI: | https://cronfa.swan.ac.uk/Record/cronfa61046 |
| College: |
Faculty of Science and Engineering |
|---|---|
| Start Page: |
327 |
| End Page: |
344 |

