Show simple item record

dc.contributor.author Heiland, Randy
dc.contributor.author Welch, Von
dc.date.accessioned 2016-01-26T14:36:32Z
dc.date.available 2016-01-26T14:36:32Z
dc.date.issued 2015-05
dc.identifier.uri http://hdl.handle.net/2022/20616
dc.description.abstract Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. We demonstrate techniques for analyzing a large log of authentication events and associated graphs. Our approach is instructional and exploratory, using Python modules and tools. en
dc.description.sponsorship National Science Foundation, Grant Number 1234408. en
dc.language.iso en_US en
dc.rights This work is made available under the terms of the Creative Commons Attribution 3.0 Unported License. en
dc.rights.uri http://creativecommons.org/licenses/by/3.0/deed.en_US en
dc.subject cybersecurity en
dc.subject authentication en
dc.subject graphs en
dc.subject software en
dc.subject Python en
dc.title Analysis of authentication events and graphs using Python en
dc.type Presentation en
dc.type Software en
dc.altmetrics.display true en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search IUScholarWorks


Advanced Search

Browse

My Account

Statistics