Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
Date first appeared online 23/09/2010
DOI 10.1007/s10796-010-9268-7
Authors Shaikh S.
Journal Name Information Systems Frontiers
Volume 15

Documents