Show simple item record Heiland, Randy Welch, Von 2016-01-26T14:36:32Z 2016-01-26T14:36:32Z 2015-05
dc.description.abstract Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools. en
dc.description.sponsorship National Science Foundation, Grant Number 1234408. en
dc.language.iso en_US en
dc.rights This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License. en
dc.rights.uri en
dc.subject cybersecurity en
dc.subject authentication en
dc.subject graphs en
dc.subject software en
dc.subject Python en
dc.title Analysis of authentication events and graphs using Python en
dc.type Presentation en
dc.type Software en
dc.altmetrics.display true en

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUScholarWorks

Advanced Search


My Account