Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

D. Shalini Punithavathani, K. Sujatha, J. Mark Jain. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Cluster Computing, 18(1):435-451, 2015. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.