Modelling user behaviour in a network using computer event logs
暂无分享,去创建一个
Alexander D. Kent | Nicholas A. Heard | Melissa Turcotte | Melissa J. M. Turcotte | A. Kent | N. Heard
[1] Alexander D. Kent,et al. Cyber security data sources for dynamic network research , 2016 .
[2] Patrick Rubin-Delanchy,et al. On the mid-p-value of a test statistic with arbitrary real support , 2015, 1505.05068.
[3] Lorie M. Liebrock,et al. Authentication graphs: Analyzing user behavior within an enterprise network , 2015, Comput. Secur..
[4] R. Fisher. Statistical methods for research workers , 1927, Protoplasma.
[5] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[6] H. O. Lancaster. Statistical control of counting experiments , 1952 .