No Cover Image

Journal article 567 views

Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

Harsha K. Kalutarage, Siraj Shaikh Orcid Logo, Indika P. Wickramasinghe, Qin Zhou, Anne E. James

Computers & Electrical Engineering, Volume: 47, Pages: 327 - 344

Swansea University Author: Siraj Shaikh Orcid Logo

Full text not available from this repository: check for access using links below.

Published in: Computers & Electrical Engineering
ISSN: 0045-7906
Published: Elsevier BV 2015
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61046
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2022-10-14T13:01:47Z
last_indexed 2023-01-13T19:21:36Z
id cronfa61046
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-10-18T11:59:53.2102189</datestamp><bib-version>v2</bib-version><id>61046</id><entry>2022-09-05</entry><title>Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks</title><swanseaauthors><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>SCS</deptcode><abstract/><type>Journal Article</type><journal>Computers &amp;amp; Electrical Engineering</journal><volume>47</volume><journalNumber/><paginationStart>327</paginationStart><paginationEnd>344</paginationEnd><publisher>Elsevier BV</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>0045-7906</issnPrint><issnElectronic/><keywords/><publishedDay>1</publishedDay><publishedMonth>10</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-10-01</publishedDate><doi>10.1016/j.compeleceng.2015.07.007</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-10-18T11:59:53.2102189</lastEdited><Created>2022-09-05T22:40:43.0890959</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Harsha K.</firstname><surname>Kalutarage</surname><order>1</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>2</order></author><author><firstname>Indika P.</firstname><surname>Wickramasinghe</surname><order>3</order></author><author><firstname>Qin</firstname><surname>Zhou</surname><order>4</order></author><author><firstname>Anne E.</firstname><surname>James</surname><order>5</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2022-10-18T11:59:53.2102189 v2 61046 2022-09-05 Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 SCS Journal Article Computers &amp; Electrical Engineering 47 327 344 Elsevier BV 0045-7906 1 10 2015 2015-10-01 10.1016/j.compeleceng.2015.07.007 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University 2022-10-18T11:59:53.2102189 2022-09-05T22:40:43.0890959 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Harsha K. Kalutarage 1 Siraj Shaikh 0000-0002-0726-3319 2 Indika P. Wickramasinghe 3 Qin Zhou 4 Anne E. James 5
title Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
spellingShingle Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
Siraj Shaikh
title_short Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
title_full Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
title_fullStr Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
title_full_unstemmed Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
title_sort Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
author_id_str_mv 50117e8faac2d0937989e14847105704
author_id_fullname_str_mv 50117e8faac2d0937989e14847105704_***_Siraj Shaikh
author Siraj Shaikh
author2 Harsha K. Kalutarage
Siraj Shaikh
Indika P. Wickramasinghe
Qin Zhou
Anne E. James
format Journal article
container_title Computers &amp; Electrical Engineering
container_volume 47
container_start_page 327
publishDate 2015
institution Swansea University
issn 0045-7906
doi_str_mv 10.1016/j.compeleceng.2015.07.007
publisher Elsevier BV
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 0
active_str 0
published_date 2015-10-01T04:19:38Z
_version_ 1763754302609817600
score 11.035634