Login / Signup

A Fresh Look at Combining Logs and Network Data to Detect Anomalous Activity.

Matthew BantonNathan ShoneWilliam HurstQi Shi
Published in: ICT-DM (2019)
Keyphrases