Using identity credential usage logs to detect anomalous service accesses

Daisuke Mashima, Mustaque Ahamad. Using identity credential usage logs to detect anomalous service accesses. In Elisa Bertino, Thomas Groß, Kenji Takahashi, editors, Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l. pages 73-80, ACM, 2009. [doi]

@inproceedings{MashimaA09,
  title = {Using identity credential usage logs to detect anomalous service accesses},
  author = {Daisuke Mashima and Mustaque Ahamad},
  year = {2009},
  doi = {10.1145/1655028.1655044},
  url = {http://doi.acm.org/10.1145/1655028.1655044},
  researchr = {https://researchr.org/publication/MashimaA09},
  cites = {0},
  citedby = {0},
  pages = {73-80},
  booktitle = {Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l},
  editor = {Elisa Bertino and Thomas Groß and Kenji Takahashi},
  publisher = {ACM},
  isbn = {978-1-60558-786-8},
}