Login / Signup
A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts.
Neil Shah
Grant Ho
Marco Schweighauser
M. H. Afifi
Asaf Cidon
David A. Wagner
Published in:
CoRR (2020)
Keyphrases
</>
real world
machine learning
data sets
databases
neural network
genetic algorithm
video sequences
mobile robot
end users
web search
statistical analysis
activity recognition
activity theory