@inproceedings{MashimaA09, title = {Using identity credential usage logs to detect anomalous service accesses}, author = {Daisuke Mashima and Mustaque Ahamad}, year = {2009}, doi = {10.1145/1655028.1655044}, url = {http://doi.acm.org/10.1145/1655028.1655044}, researchr = {https://researchr.org/publication/MashimaA09}, cites = {0}, citedby = {0}, pages = {73-80}, booktitle = {dim}, } @inproceedings{MashimaAK09, title = {User-Centric Handling of Identity Agent Compromise}, author = {Daisuke Mashima and Mustaque Ahamad and Swagath Kannan}, year = {2009}, doi = {10.1007/978-3-642-04444-1_2}, url = {http://dx.doi.org/10.1007/978-3-642-04444-1_2}, researchr = {https://researchr.org/publication/MashimaAK09}, cites = {0}, citedby = {0}, pages = {19-36}, booktitle = {esorics}, }