D. Shalini Punithavathani, K. Sujatha, J. Mark Jain. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Cluster Computing, 18(1):435-451, 2015. [doi]
@article{PunithavathaniS15, title = {Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence}, author = {D. Shalini Punithavathani and K. Sujatha and J. Mark Jain}, year = {2015}, doi = {10.1007/s10586-014-0403-y}, url = {http://dx.doi.org/10.1007/s10586-014-0403-y}, researchr = {https://researchr.org/publication/PunithavathaniS15}, cites = {0}, citedby = {0}, journal = {Cluster Computing}, volume = {18}, number = {1}, pages = {435-451}, }