Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks

Harsha Kalutarage, Siraj A. Shaikh, I.P. Wickramasinghe, Qin Zhou, Anne James

    Research output: Contribution to journalArticlepeer-review

    10 Citations (Scopus)
    56 Downloads (Pure)

    Search results