"Surveillance of anomaly and misuse in critical networks to counter insider ..."

D. Shalini Punithavathani, K. Sujatha, J. Mark Jain (2015)

Details and statistics

DOI: 10.1007/S10586-014-0403-Y

access: closed

type: Journal Article

metadata version: 2020-09-29

a service of  Schloss Dagstuhl - Leibniz Center for Informatics