Return to Article Details A Study of Detection of Structurally Anomalous Logins within Enterprise Networks for Network Security of Organizations Download Download PDF