Sign in

Detecting Anomalous Misconfigurations in AWS Identity and Access Management Policies.

Thijs van EdeNiek KhasuntsevBas SteenAndrea Continella
Published in: CCSW@CCS (2022)
Keyphrases
  • management policies
  • detecting anomalous
  • anomaly detection
  • intrusion detection
  • management system
  • supply chain
  • information systems
  • network traffic
  • image segmentation
  • semi supervised
  • access control