Show simple item record

dc.contributor.authorMeng, Wen
dc.contributor.authorChoo, K-KRen
dc.contributor.authorFurnell, Sen
dc.contributor.authorVasilakos, AVen
dc.contributor.authorProbst, CWen
dc.date.accessioned2018-11-19T11:06:15Z
dc.date.available2018-11-19T11:06:15Z
dc.date.issued2018-06en
dc.identifier.issn1932-4537en
dc.identifier.urihttp://hdl.handle.net/10026.1/12800
dc.format.extent761 - 773en
dc.language.isoenen
dc.publisherInstitute of Electrical and Electronics Engineersen
dc.titleTowards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networksen
dc.typeJournal Article
plymouth.issue2en
plymouth.volume15en
plymouth.journalIEEE Transactions on Network and Service Managementen
dc.identifier.doi10.1109/TNSM.2018.2815280en
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Users by role
dcterms.dateAccepted2018-02-25en
dc.rights.embargoperiodNot knownen
rioxxterms.versionofrecord10.1109/TNSM.2018.2815280en
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserveden
rioxxterms.licenseref.startdate2018-06en
rioxxterms.typeJournal Article/Reviewen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV