Using identity credential usage logs to detect anomalous service accesses

Daisuke Mashima, Mustaque Ahamad. Using identity credential usage logs to detect anomalous service accesses. In Elisa Bertino, Thomas Groß, Kenji Takahashi, editors, Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l. pages 73-80, ACM, 2009. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.