"Identification of anomalous network security token usage via clustering ..."

Richard E. Harang, William J. Glodek (2012)

Details and statistics

DOI: 10.1109/CISS.2012.6310829

access: closed

type: Conference or Workshop Paper

metadata version: 2017-05-19

a service of  Schloss Dagstuhl - Leibniz Center for Informatics