A deployment value model for intrusion detection sensors

dc.contributor.authorShaikh, S. A.-
dc.contributor.authorChivers, H.-
dc.contributor.authorNobles, P.-
dc.contributor.authorClark, J. A.-
dc.contributor.authorChen, H.-
dc.date.accessioned2011-12-04T23:02:13Z
dc.date.available2011-12-04T23:02:13Z
dc.date.issued2010-02-18T00:00:00Z-
dc.description.abstractThe value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different types and are diverse in their operational characteristics. There is a need to examine some of these characteristics to appreciate the value they add to intrusion detection deployments. This paper presents a model to determine the value derived from deploying sensors, which serves to be useful to analyse and compare intrusion detection deployments.en_UK
dc.identifier.citationSiraj A. Shaikh, Howard Chivers, Philip Nobles, John A. Clark and Hao Chen; A deployment value model for intrusion detection sensors, Lecture Notes in Computer Science, Volume 5576, 2009, Pages 250-259-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-642-02617-1_26-
dc.identifier.urihttp://dspace.lib.cranfield.ac.uk/handle/1826/4249
dc.publisherSpringer-verlagen_UK
dc.titleA deployment value model for intrusion detection sensorsen_UK
dc.typeArticle-

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A_deployment_value_model-2009.pdf
Size:
133.07 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
18 B
Format:
Plain Text
Description: