Login / Signup

Detecting suspicious behavior using a graph-based approach.

Lenin MookiahWilliam EberleLawrence B. Holder
Published in: IEEE VAST (2014)
Keyphrases