Authentication graphs: Analyzing user behavior within an enterprise network

Alexander D. Kent, Lorie M. Liebrock, Joshua C. Neil. Authentication graphs: Analyzing user behavior within an enterprise network. Computers & Security, 48:150-166, 2015. [doi]

Abstract

Abstract is missing.