Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

D. Shalini Punithavathani, K. Sujatha, J. Mark Jain. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Cluster Computing, 18(1):435-451, 2015. [doi]

Abstract

Abstract is missing.