Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

D. Shalini Punithavathani, K. Sujatha, J. Mark Jain. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Cluster Computing, 18(1):435-451, 2015. [doi]

@article{PunithavathaniS15,
  title = {Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence},
  author = {D. Shalini Punithavathani and K. Sujatha and J. Mark Jain},
  year = {2015},
  doi = {10.1007/s10586-014-0403-y},
  url = {http://dx.doi.org/10.1007/s10586-014-0403-y},
  researchr = {https://researchr.org/publication/PunithavathaniS15},
  cites = {0},
  citedby = {0},
  journal = {Cluster Computing},
  volume = {18},
  number = {1},
  pages = {435-451},
}