Login / Signup
Using identity credential usage logs to detect anomalous service accesses.
Daisuke Mashima
Mustaque Ahamad
Published in:
Digital Identity Management (2009)
Keyphrases
</>
usage logs
web services
user behavior
web usage
user navigation
social networks
information services
access patterns