Journal article 585 views
Effective network security monitoring: from attribution to target-centric monitoring
Telecommunication Systems, Volume: 62, Issue: 1, Pages: 167 - 178
Swansea University Author: Siraj Shaikh
Full text not available from this repository: check for access using links below.
DOI (Published version): 10.1007/s11235-015-0071-0
Abstract
Effective network security monitoring: from attribution to target-centric monitoring
Published in: | Telecommunication Systems |
---|---|
ISSN: | 1018-4864 1572-9451 |
Published: |
Springer Science and Business Media LLC
2016
|
Online Access: |
Check full text
|
URI: | https://cronfa.swan.ac.uk/Record/cronfa61045 |
first_indexed |
2022-10-14T15:25:19Z |
---|---|
last_indexed |
2023-01-13T19:21:36Z |
id |
cronfa61045 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2022-10-18T12:00:33.7743673</datestamp><bib-version>v2</bib-version><id>61045</id><entry>2022-09-05</entry><title>Effective network security monitoring: from attribution to target-centric monitoring</title><swanseaauthors><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>MACS</deptcode><abstract/><type>Journal Article</type><journal>Telecommunication Systems</journal><volume>62</volume><journalNumber>1</journalNumber><paginationStart>167</paginationStart><paginationEnd>178</paginationEnd><publisher>Springer Science and Business Media LLC</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1018-4864</issnPrint><issnElectronic>1572-9451</issnElectronic><keywords>Communication networks; Network security; Attribution; Bayesian statistics; Scalable monitoring</keywords><publishedDay>1</publishedDay><publishedMonth>5</publishedMonth><publishedYear>2016</publishedYear><publishedDate>2016-05-01</publishedDate><doi>10.1007/s11235-015-0071-0</doi><url/><notes/><college>COLLEGE NANME</college><department>Mathematics and Computer Science School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>MACS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders>Both authors have carried out this work partially under a Grant (EP/L022656/1) received by the Engineering and Physical Sciences Research Council (EPSRC) of the UK.</funders><projectreference/><lastEdited>2022-10-18T12:00:33.7743673</lastEdited><Created>2022-09-05T22:39:13.2757309</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>1</order></author><author><firstname>Harsha Kumara</firstname><surname>Kalutarage</surname><order>2</order></author></authors><documents/><OutputDurs/></rfc1807> |
spelling |
2022-10-18T12:00:33.7743673 v2 61045 2022-09-05 Effective network security monitoring: from attribution to target-centric monitoring 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 MACS Journal Article Telecommunication Systems 62 1 167 178 Springer Science and Business Media LLC 1018-4864 1572-9451 Communication networks; Network security; Attribution; Bayesian statistics; Scalable monitoring 1 5 2016 2016-05-01 10.1007/s11235-015-0071-0 COLLEGE NANME Mathematics and Computer Science School COLLEGE CODE MACS Swansea University Both authors have carried out this work partially under a Grant (EP/L022656/1) received by the Engineering and Physical Sciences Research Council (EPSRC) of the UK. 2022-10-18T12:00:33.7743673 2022-09-05T22:39:13.2757309 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Siraj Shaikh 0000-0002-0726-3319 1 Harsha Kumara Kalutarage 2 |
title |
Effective network security monitoring: from attribution to target-centric monitoring |
spellingShingle |
Effective network security monitoring: from attribution to target-centric monitoring Siraj Shaikh |
title_short |
Effective network security monitoring: from attribution to target-centric monitoring |
title_full |
Effective network security monitoring: from attribution to target-centric monitoring |
title_fullStr |
Effective network security monitoring: from attribution to target-centric monitoring |
title_full_unstemmed |
Effective network security monitoring: from attribution to target-centric monitoring |
title_sort |
Effective network security monitoring: from attribution to target-centric monitoring |
author_id_str_mv |
50117e8faac2d0937989e14847105704 |
author_id_fullname_str_mv |
50117e8faac2d0937989e14847105704_***_Siraj Shaikh |
author |
Siraj Shaikh |
author2 |
Siraj Shaikh Harsha Kumara Kalutarage |
format |
Journal article |
container_title |
Telecommunication Systems |
container_volume |
62 |
container_issue |
1 |
container_start_page |
167 |
publishDate |
2016 |
institution |
Swansea University |
issn |
1018-4864 1572-9451 |
doi_str_mv |
10.1007/s11235-015-0071-0 |
publisher |
Springer Science and Business Media LLC |
college_str |
Faculty of Science and Engineering |
hierarchytype |
|
hierarchy_top_id |
facultyofscienceandengineering |
hierarchy_top_title |
Faculty of Science and Engineering |
hierarchy_parent_id |
facultyofscienceandengineering |
hierarchy_parent_title |
Faculty of Science and Engineering |
department_str |
School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science |
document_store_str |
0 |
active_str |
0 |
published_date |
2016-05-01T14:22:58Z |
_version_ |
1821415706660438016 |
score |
11.247077 |