Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

H. Chivers, J.A. Clark, P. Nobles, Siraj A. Shaikh, H. Chen

    Research output: Contribution to journalArticle

    18 Citations (Scopus)
    Original languageEnglish
    JournalInformation Systems Frontiers
    Volume(in press)
    DOIs
    Publication statusPublished - 2010

    Bibliographical note

    The full text of this item is not available from the repository.
    The final publication is available at www.springerlink.com".

    Keywords

    • insider
    • behavioural
    • subtle attack
    • intrusion detection
    • security
    • evidence
    • network
    • Bayesian

    Cite this