• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Detecting Structurally Anomalous Logins Within Enterprise Networks.

Hossein SiadatiNasir D. Memon
Published in: CCS (2017)
Keyphrases
  • real time
  • detecting anomalous
  • anomaly detection
  • detect anomalies
  • data sets
  • pattern recognition
  • viewpoint
  • image sequences
  • data structure
  • data analysis
  • management system
  • network traffic
  • anomalous behavior