@dblp

Hunting abnormal configurations for permission-sensitive role mining.

, , , , and . MILCOM, page 1004-1009. IEEE, (2016)

Links and resources

Tags