No Cover Image

Journal article 658 views

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

Howard Chivers, John A. Clark, Philip Nobles, Siraj Shaikh Orcid Logo, Hao Chen

Information Systems Frontiers, Volume: 15, Issue: 1, Pages: 17 - 34

Swansea University Author: Siraj Shaikh Orcid Logo

Full text not available from this repository: check for access using links below.

Published in: Information Systems Frontiers
ISSN: 1387-3326 1572-9419
Published: Springer Science and Business Media LLC 2013
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61048
Tags: Add Tag
No Tags, Be the first to tag this record!
Keywords: Insider; Behavioural; Subtle attack; Intrusion detection; Security; Evidence; Network; Bayesian
College: Faculty of Science and Engineering
Issue: 1
Start Page: 17
End Page: 34