Login / Signup
Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies.
Thijs van Ede
Niek Khasuntsev
Bas Steen
Andrea Continella
Published in:
CCSW@CCS (2022)
Keyphrases
</>
management policies
detecting anomalous
anomaly detection
intrusion detection
management system
supply chain
information systems
network traffic
image segmentation
semi supervised
access control