A deployment value model for intrusion detection sensors

dc.contributor.authorShaikh, Siraj A.-
dc.contributor.authorChivers, Howard-
dc.contributor.authorNobles, Philip-
dc.contributor.authorClark, John A.-
dc.contributor.authorChen, Hao-
dc.date.accessioned2011-12-04T23:02:13Z
dc.date.available2011-12-04T23:02:13Z
dc.date.issued2010-02-18T00:00:00Z-
dc.description.abstractThe value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different types and are diverse in their operational characteristics. There is a need to examine some of these characteristics to appreciate the value they add to intrusion detection deployments. This paper presents a model to determine the value derived from deploying sensors, which serves to be useful to analyse and compare intrusion detection deployments.en_UK
dc.identifier.citationShaikh SA, Chivers H, Nobles P, et al., (2009) A deployment value model for intrusion detection sensors. Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, 25-27 June 2009. Seoul, Korea. Lecture Notes in Computer Science, Volume 5576, 2009, Pages 250-259-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://dx.doi.org/10.1007/978-3-642-02617-1_26-
dc.identifier.urihttp://dspace.lib.cranfield.ac.uk/handle/1826/4249
dc.publisherSpringeren_UK
dc.titleA deployment value model for intrusion detection sensorsen_UK
dc.typeArticle-

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A_deployment_value_model-2009.pdf
Size:
133.07 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
18 B
Format:
Plain Text
Description: