Login / Signup
Authentication graphs: Analyzing user behavior within an enterprise network.
Alexander D. Kent
Lorie M. Liebrock
Joshua C. Neil
Published in:
Comput. Secur. (2015)
Keyphrases
</>
user behavior
enterprise network
user interaction
security issues
user preferences
user actions
web usage mining
attack graph
browsing behavior
user behavior patterns
user browsing
graph mining
directed graph
individual user
user goals
click models
user activity
power consumption