Login / Signup
Host in Danger? Detecting Network Intrusions from Authentication Logs.
Haibo Bian
Tim Bai
Mohammad A. Salahuddin
Noura Limam
Abbas Abou Daya
Raouf Boutaba
Published in:
CNSM (2019)
Keyphrases
</>
network intrusions
intrusion detection
intrusion detection system
network traffic
network intrusion detection
network security
network attacks
social networks
lightweight
user authentication
image authentication
authentication mechanism