Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
Date first appeared online | 23/09/2010 |
DOI | 10.1007/s10796-010-9268-7 |
Authors | Shaikh S. |
Journal Name | Information Systems Frontiers |
Volume | 15 |