Sign in

Using identity credential usage logs to detect anomalous service accesses.

Daisuke MashimaMustaque Ahamad
Published in: Digital Identity Management (2009)
Keyphrases
  • usage logs
  • web services
  • user behavior
  • web usage
  • user navigation
  • social networks
  • information services
  • access patterns