Login / Signup

Hunting abnormal configurations for permission-sensitive role mining.

Lihua YinLiang FangBen NiuBinxing FangFenghua Li
Published in: MILCOM (2016)
Keyphrases