作者: Pratyusa K. Manadhata , Mijung Kim , Manish Marwah
DOI:
关键词:
摘要: In some examples, for a given authentication event between plurality of devices in network, system identifies set events, at the devices, that are temporally related to event. The extracts features from events by aggregating data events. provides extracted classifier detects unauthorized