Original language | English |
---|---|
Journal | Information Systems Frontiers |
Volume | (in press) |
DOIs | |
Publication status | Published - 2010 |
Bibliographical note
The full text of this item is not available from the repository.The final publication is available at www.springerlink.com".
Keywords
- insider
- behavioural
- subtle attack
- intrusion detection
- security
- evidence
- network
- Bayesian