Author of the publication

Connected Components and Credential Hopping in Authentication Graphs.

, , , and . SITIS, page 416-423. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Peer-group Behaviour Analytics of Windows Authentications Events Using Hierarchical Bayesian Modelling., , , , and . CoRR, (2022)A Large-Scale Database for Graph Representation Learning., , , and . CoRR, (2020)Attack chain detection., , and . Stat. Anal. Data Min., 8 (5-6): 353-363 (2015)Anomaly Detection in Large-Scale Networks With Latent Space Models., , , , and . Technometrics, 64 (2): 241-252 (2022)Detecting Cyber Attacks Using Anomaly Detection with Explanations and Expert Feedback., , , , , , and . ICASSP, page 2872-2876. IEEE, (2019)A Large-Scale Database for Graph Representation Learning., , , and . NeurIPS Datasets and Benchmarks, (2021)Detecting Localised Anomalous Behaviour in a Computer Network., , and . IDA, volume 8819 of Lecture Notes in Computer Science, page 321-332. Springer, (2014)Connected Components and Credential Hopping in Authentication Graphs., , , and . SITIS, page 416-423. IEEE Computer Society, (2014)Web Adoption: An Attempt Toward Classifying Risky Internet Web Browsing Behavior., , and . LASER, page 25-36. USENIX Association, (2013)Effective Detection of Credential Thefts from Windows Memory: Learning Access Behaviours to Local Security Authority Subsystem Service., , , , and . RAID, page 181-194. USENIX Association, (2020)