Author:
Xiang Jiahui,Salem Osman,Mehaoua Ahmed
Publisher
Springer Nature Switzerland
Reference10 articles.
1. Allen, R., Lowe-Norris, A.: Active Directory. O’Reilly Media, Inc., Sebastopol (2003)
2. Binduf, A., Alamoudi, H.O., Balahmar, H., Alshamrani, S., Al-Omar, H., Nagy, N.: Active directory and related aspects of security. In: 2018 21st Saudi Computer Society National Computer Conference (NCC), pp. 4474–4479. IEEE (2018)
3. Djosic, N., Nokovic, B., Sharieh, S.: Machine learning in action: securing IAM API by risk authentication decision engine. In: 2020 IEEE Conference on Communications and Network Security (CNS), pp. 1–4. IEEE (2020)
4. Howes, T., Smith, M., Good, G.S.: Understanding and Deploying LDAP Directory Services. Addison-Wesley Professional, Boston (2003)
5. Kawahara, Y., Yairi, T., Machida, K.: Change-point detection in time-series data based on subspace identification. In: Seventh IEEE International Conference on Data Mining (ICDM 2007), pp. 559–564. IEEE (2007)