Effective network security monitoring: from attribution to target-centric monitoring
Crossref DOI link: https://doi.org/10.1007/s11235-015-0071-0
Published Online: 2015-06-06
Published Print: 2016-05
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Shaikh, Siraj Ahmed
Kalutarage, Harsha Kumara
Text and Data Mining valid from 2015-06-06