Bibliographical noteThe full text of this item is not available from the repository.
The final publication is available at www.springerlink.com".
- subtle attack
- intrusion detection
Chivers, H., Clark, J. A., Nobles, P., Shaikh, S. A., & Chen, H. (2010). Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise. Information Systems Frontiers, (in press). https://doi.org/10.1007/s10796-010-9268-7