
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
Keywords: فیوژن بیزی; Stealthy attacks; Bayesian fusion; Network simulation; Traffic sampling; Anomaly detection