{"_id":"25ZnBqTY4vtH8EYEB","bibbaseid":"gonalves-zanchettin-detectingabnormalloginsbydiscoveringanomalouslinksviagraphtransformers-2024","author_short":["Gonçalves, L.","Zanchettin, C."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Luís"],"propositions":[],"lastnames":["Gonçalves"],"suffixes":[]},{"firstnames":["Cleber"],"propositions":[],"lastnames":["Zanchettin"],"suffixes":[]}],"title":"Detecting abnormal logins by discovering anomalous links via graph transformers","journal":"Comput. Secur.","volume":"144","pages":"103944","year":"2024","url":"https://doi.org/10.1016/j.cose.2024.103944","doi":"10.1016/J.COSE.2024.103944","timestamp":"Sun, 08 Sep 2024 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/compsec/GoncalvesZ24.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/compsec/GoncalvesZ24,\n author = {Lu{\\'{\\i}}s Gon{\\c{c}}alves and\n Cleber Zanchettin},\n title = {Detecting abnormal logins by discovering anomalous links via graph\n transformers},\n journal = {Comput. Secur.},\n volume = {144},\n pages = {103944},\n year = {2024},\n url = {https://doi.org/10.1016/j.cose.2024.103944},\n doi = {10.1016/J.COSE.2024.103944},\n timestamp = {Sun, 08 Sep 2024 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/compsec/GoncalvesZ24.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Gonçalves, L.","Zanchettin, C."],"key":"DBLP:journals/compsec/GoncalvesZ24","id":"DBLP:journals/compsec/GoncalvesZ24","bibbaseid":"gonalves-zanchettin-detectingabnormalloginsbydiscoveringanomalouslinksviagraphtransformers-2024","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.cose.2024.103944"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/75/5629.bib","dataSources":["XkGKCoQgZDKqXZqdh"],"keywords":[],"search_terms":["detecting","abnormal","logins","discovering","anomalous","links","via","graph","transformers","gonçalves","zanchettin"],"title":"Detecting abnormal logins by discovering anomalous links via graph transformers","year":2024}