{"_id":"WS8yssMoHYg3879sX","bibbaseid":"baee-simpson-armstrong-anomalydetectioninkeymanagementactivitiesusingmetadataacasestudyandframework-2024","author_short":["Baee, M. A. R.","Simpson, L.","Armstrong, W."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Mir","Ali","Rezazadeh"],"propositions":[],"lastnames":["Baee"],"suffixes":[]},{"firstnames":["Leonie"],"propositions":[],"lastnames":["Simpson"],"suffixes":[]},{"firstnames":["Warren"],"propositions":[],"lastnames":["Armstrong"],"suffixes":[]}],"title":"Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework","journal":"IEEE Open J. Comput. Soc.","volume":"5","pages":"315–328","year":"2024","url":"https://doi.org/10.1109/OJCS.2024.3407547","doi":"10.1109/OJCS.2024.3407547","timestamp":"Thu, 04 Jul 2024 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/ojcomps/BaeeSA24a.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/ojcomps/BaeeSA24a,\n author = {Mir Ali Rezazadeh Baee and\n Leonie Simpson and\n Warren Armstrong},\n title = {Anomaly Detection in Key-Management Activities Using Metadata: {A}\n Case Study and Framework},\n journal = {{IEEE} Open J. Comput. Soc.},\n volume = {5},\n pages = {315--328},\n year = {2024},\n url = {https://doi.org/10.1109/OJCS.2024.3407547},\n doi = {10.1109/OJCS.2024.3407547},\n timestamp = {Thu, 04 Jul 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/ojcomps/BaeeSA24a.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Baee, M. A. R.","Simpson, L.","Armstrong, W."],"key":"DBLP:journals/ojcomps/BaeeSA24a","id":"DBLP:journals/ojcomps/BaeeSA24a","bibbaseid":"baee-simpson-armstrong-anomalydetectioninkeymanagementactivitiesusingmetadataacasestudyandframework-2024","role":"author","urls":{"Paper":"https://doi.org/10.1109/OJCS.2024.3407547"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/164/4873.bib","dataSources":["gHNz2ySxuTAwForbR","TAqaygMACHMTCp5x4","QnCLXdFxJhT94HL3j"],"keywords":[],"search_terms":["anomaly","detection","key","management","activities","using","metadata","case","study","framework","baee","simpson","armstrong"],"title":"Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework","year":2024}