Cite

MLA Citation

    Harsha K. Kalutarage et al.. “Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks.” Computers & electrical engineering, vol. 47, 2015, pp. 327–344. http://access.bl.uk/ark:/81055/vdc_100030037978.0x000026
  
Back to record