[1]
Jigyasa, “A Study of Detection of Structurally Anomalous Logins within Enterprise Networks for Network Security of Organizations”, IJRESM, vol. 5, no. 8, pp. 58–65, Aug. 2022, Accessed: Nov. 23, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/2321