Author:
Sohal Amandeep Singh,Sandhu Rajinder,Sood Sandeep K.,Chang Victor
Subject
Law,General Computer Science
Reference54 articles.
1. Cyber security analytics: a stochastic model for security quantification using absorbing markov chains;Abraham;J Commun,2014
2. A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks;Artail;Comput Secur,2006
3. Analyzing user behavior using keystroke dynamics to protect cloud from malicious insiders;Bondada,2015
4. Fog computing and its role in the Internet of Things;Bonomi,2012
5. Designing host and network sensors to mitigate the insider threat;Bowen;IEEE Secur Priv,2009
Cited by
191 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献