Detecting Structurally Anomalous Logins Within Enterprise Networks release_qe53ush76zhvbjxipsazwmvabm

by Hossein Siadati, Nasir Memon

Published in Conference on Computer and Communications Security by ACM Press.

2017   p1273-1284

Archived Files and Locations

application/pdf   1.5 MB
file_rc4bld3xjrchrnoifl5jgtocey
acmccs.github.io (web)
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2017
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 783d6d9c-a8e7-4ac5-9997-be79628291fe
API URL: JSON