Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

Harsha Kalutarage, Siraj A. Shaikh, I.P. Wickramasinghe, Qin Zhou, Anne James

    Research output: Contribution to journalArticlepeer-review

    10 Citations (Scopus)
    56 Downloads (Pure)

    Fingerprint

    Dive into the research topics of 'Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks'. Together they form a unique fingerprint.

    Engineering & Materials Science