Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
Date first appeared online 18/07/2015
DOI 10.1016/j.compeleceng.2015.07.007
Authors Shaikh S.
Journal Name Computers & Electrical Engineering
Volume 47

Documents