No Cover Image

Journal article 453 views

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

Howard Chivers, John A. Clark, Philip Nobles, Siraj Shaikh Orcid Logo, Hao Chen

Information Systems Frontiers, Volume: 15, Issue: 1, Pages: 17 - 34

Swansea University Author: Siraj Shaikh Orcid Logo

Full text not available from this repository: check for access using links below.

Published in: Information Systems Frontiers
ISSN: 1387-3326 1572-9419
Published: Springer Science and Business Media LLC 2013
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61048
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2022-10-14T13:14:55Z
last_indexed 2023-01-13T19:21:36Z
id cronfa61048
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-10-18T11:57:01.7901723</datestamp><bib-version>v2</bib-version><id>61048</id><entry>2022-09-05</entry><title>Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise</title><swanseaauthors><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>SCS</deptcode><abstract/><type>Journal Article</type><journal>Information Systems Frontiers</journal><volume>15</volume><journalNumber>1</journalNumber><paginationStart>17</paginationStart><paginationEnd>34</paginationEnd><publisher>Springer Science and Business Media LLC</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>1387-3326</issnPrint><issnElectronic>1572-9419</issnElectronic><keywords>Insider; Behavioural; Subtle attack; Intrusion detection; Security; Evidence; Network; Bayesian</keywords><publishedDay>1</publishedDay><publishedMonth>3</publishedMonth><publishedYear>2013</publishedYear><publishedDate>2013-03-01</publishedDate><doi>10.1007/s10796-010-9268-7</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-10-18T11:57:01.7901723</lastEdited><Created>2022-09-05T22:42:04.7081379</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Howard</firstname><surname>Chivers</surname><order>1</order></author><author><firstname>John A.</firstname><surname>Clark</surname><order>2</order></author><author><firstname>Philip</firstname><surname>Nobles</surname><order>3</order></author><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>4</order></author><author><firstname>Hao</firstname><surname>Chen</surname><order>5</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2022-10-18T11:57:01.7901723 v2 61048 2022-09-05 Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 SCS Journal Article Information Systems Frontiers 15 1 17 34 Springer Science and Business Media LLC 1387-3326 1572-9419 Insider; Behavioural; Subtle attack; Intrusion detection; Security; Evidence; Network; Bayesian 1 3 2013 2013-03-01 10.1007/s10796-010-9268-7 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University 2022-10-18T11:57:01.7901723 2022-09-05T22:42:04.7081379 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Howard Chivers 1 John A. Clark 2 Philip Nobles 3 Siraj Shaikh 0000-0002-0726-3319 4 Hao Chen 5
title Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
spellingShingle Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
Siraj Shaikh
title_short Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
title_full Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
title_fullStr Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
title_full_unstemmed Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
title_sort Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise
author_id_str_mv 50117e8faac2d0937989e14847105704
author_id_fullname_str_mv 50117e8faac2d0937989e14847105704_***_Siraj Shaikh
author Siraj Shaikh
author2 Howard Chivers
John A. Clark
Philip Nobles
Siraj Shaikh
Hao Chen
format Journal article
container_title Information Systems Frontiers
container_volume 15
container_issue 1
container_start_page 17
publishDate 2013
institution Swansea University
issn 1387-3326
1572-9419
doi_str_mv 10.1007/s10796-010-9268-7
publisher Springer Science and Business Media LLC
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 0
active_str 0
published_date 2013-03-01T04:19:39Z
_version_ 1763754302853087232
score 11.013619