Journal article 1027 views
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
Information Systems Frontiers, Volume: 15, Issue: 1, Pages: 17 - 34
Swansea University Author:
Siraj Shaikh
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1007/s10796-010-9268-7
Abstract
Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
| Published in: | Information Systems Frontiers |
|---|---|
| ISSN: | 1387-3326 1572-9419 |
| Published: |
Springer Science and Business Media LLC
2013
|
| Online Access: |
Check full text
|
| URI: | https://cronfa.swan.ac.uk/Record/cronfa61048 |
| Keywords: |
Insider; Behavioural; Subtle attack; Intrusion detection; Security; Evidence; Network; Bayesian |
|---|---|
| College: |
Faculty of Science and Engineering |
| Issue: |
1 |
| Start Page: |
17 |
| End Page: |
34 |

