Analysis of authentication events and graphs using Python

dc.altmetrics.displaytrueen
dc.contributor.authorHeiland, Randy
dc.contributor.authorWelch, Von
dc.date.accessioned2016-01-26T14:36:32Z
dc.date.available2016-01-26T14:36:32Z
dc.date.issued2015-05
dc.description.abstractDiscerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools.en
dc.description.sponsorshipNational Science Foundation, Grant Number 1234408.en
dc.identifier.urihttps://hdl.handle.net/2022/20616
dc.language.isoen_USen
dc.rightsThis work is made available under the terms of the Creative Commons Attribution 3.0 Unported License.en
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/deed.en_USen
dc.subjectcybersecurityen
dc.subjectauthenticationen
dc.subjectgraphsen
dc.subjectsoftwareen
dc.subjectPythonen
dc.titleAnalysis of authentication events and graphs using Pythonen
dc.typePresentationen
dc.typeSoftwareen

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
auth-analysis-siam2015-poster.pdf
Size:
246.15 KB
Format:
Adobe Portable Document Format
Description:
Poster
Loading...
Thumbnail Image
Name:
auth-analysis-siam2015.pdf
Size:
371.39 KB
Format:
Adobe Portable Document Format
Can’t use the file because of accessibility barriers? Contact us with the title of the item, permanent link, and specifics of your accommodation need.