Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

D. Shalini Punithavathani, K. Sujatha, J. Mark Jain. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Cluster Computing, 18(1):435-451, 2015. [doi]

Authors

D. Shalini Punithavathani

This author has not been identified. Look up 'D. Shalini Punithavathani' in Google

K. Sujatha

This author has not been identified. Look up 'K. Sujatha' in Google

J. Mark Jain

This author has not been identified. Look up 'J. Mark Jain' in Google