Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/milcom/YinFNFL16
%A Yin, Lihua
%A Fang, Liang
%A Niu, Ben
%A Fang, Binxing
%A Li, Fenghua
%B MILCOM
%D 2016
%E Brand, Jerry
%E Valenti, Matthew C.
%E Akinpelu, Akinwale
%E Doshi, Bharat T.
%E Gorsic, Bonnie L.
%I IEEE
%K dblp
%P 1004-1009
%T Hunting abnormal configurations for permission-sensitive role mining.
%U http://dblp.uni-trier.de/db/conf/milcom/milcom2016.html#YinFNFL16
%@ 978-1-5090-3781-0
@inproceedings{conf/milcom/YinFNFL16,
added-at = {2018-07-04T00:00:00.000+0200},
author = {Yin, Lihua and Fang, Liang and Niu, Ben and Fang, Binxing and Li, Fenghua},
biburl = {https://www.bibsonomy.org/bibtex/2f710214cf93df5b7f0eda9df6e524cb2/dblp},
booktitle = {MILCOM},
crossref = {conf/milcom/2016},
editor = {Brand, Jerry and Valenti, Matthew C. and Akinpelu, Akinwale and Doshi, Bharat T. and Gorsic, Bonnie L.},
ee = {https://doi.org/10.1109/MILCOM.2016.7795461},
interhash = {109b6c6581f5cfd181b0662c1cf95fcc},
intrahash = {f710214cf93df5b7f0eda9df6e524cb2},
isbn = {978-1-5090-3781-0},
keywords = {dblp},
pages = {1004-1009},
publisher = {IEEE},
timestamp = {2018-07-05T12:04:58.000+0200},
title = {Hunting abnormal configurations for permission-sensitive role mining.},
url = {http://dblp.uni-trier.de/db/conf/milcom/milcom2016.html#YinFNFL16},
year = 2016
}