A deployment value model for intrusion detection sensors
| dc.contributor.author | Shaikh, Siraj A. | - |
| dc.contributor.author | Chivers, Howard | - |
| dc.contributor.author | Nobles, Philip | - |
| dc.contributor.author | Clark, John A. | - |
| dc.contributor.author | Chen, Hao | - |
| dc.date.accessioned | 2011-12-04T23:02:13Z | |
| dc.date.available | 2011-12-04T23:02:13Z | |
| dc.date.issued | 2010-02-18T00:00:00Z | - |
| dc.description.abstract | The value of an intrusion detection sensor is often associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different types and are diverse in their operational characteristics. There is a need to examine some of these characteristics to appreciate the value they add to intrusion detection deployments. This paper presents a model to determine the value derived from deploying sensors, which serves to be useful to analyse and compare intrusion detection deployments. | en_UK |
| dc.identifier.citation | Shaikh SA, Chivers H, Nobles P, et al., (2009) A deployment value model for intrusion detection sensors. Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, 25-27 June 2009. Seoul, Korea. Lecture Notes in Computer Science, Volume 5576, 2009, Pages 250-259 | - |
| dc.identifier.issn | 0302-9743 | - |
| dc.identifier.uri | http://dx.doi.org/10.1007/978-3-642-02617-1_26 | - |
| dc.identifier.uri | http://dspace.lib.cranfield.ac.uk/handle/1826/4249 | |
| dc.publisher | Springer | en_UK |
| dc.title | A deployment value model for intrusion detection sensors | en_UK |
| dc.type | Article | - |