Analysis of authentication events and graphs using Python
dc.altmetrics.display | true | en |
dc.contributor.author | Heiland, Randy | |
dc.contributor.author | Welch, Von | |
dc.date.accessioned | 2016-01-26T14:36:32Z | |
dc.date.available | 2016-01-26T14:36:32Z | |
dc.date.issued | 2015-05 | |
dc.description.abstract | Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools. | en |
dc.description.sponsorship | National Science Foundation, Grant Number 1234408. | en |
dc.identifier.uri | https://hdl.handle.net/2022/20616 | |
dc.language.iso | en_US | en |
dc.rights | This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License. | en |
dc.rights.uri | http://creativecommons.org/licenses/by/3.0/deed.en_US | en |
dc.subject | cybersecurity | en |
dc.subject | authentication | en |
dc.subject | graphs | en |
dc.subject | software | en |
dc.subject | Python | en |
dc.title | Analysis of authentication events and graphs using Python | en |
dc.type | Presentation | en |
dc.type | Software | en |
Collections
Can’t use the file because of accessibility barriers? Contact us with the title of the item, permanent link, and specifics of your accommodation need.