No Cover Image

Journal article 407 views

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

Harsha K. Kalutarage, Siraj Shaikh Orcid Logo, Indika P. Wickramasinghe, Qin Zhou, Anne E. James

Computers & Electrical Engineering, Volume: 47, Pages: 327 - 344

Swansea University Author: Siraj Shaikh Orcid Logo

Full text not available from this repository: check for access using links below.

Published in: Computers & Electrical Engineering
ISSN: 0045-7906
Published: Elsevier BV 2015
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61046
Tags: Add Tag
No Tags, Be the first to tag this record!
College: Faculty of Science and Engineering
Start Page: 327
End Page: 344