Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
Crossref DOI link: https://doi.org/10.1007/s10586-014-0403-y
Published Online: 2014-10-02
Published Print: 2015-03
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Punithavathani, D. Shalini
Sujatha, K.
Jain, J. Mark
Text and Data Mining valid from 2014-10-02