Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps. Urueña-López, A., Mateo, F., Navío-Marco, J., Martínez-Martínez, J. M., Gómez-Sanchís, J., Vila-Francés, J., & Serrano-López, A. J. Comput. Secur., 83:38–51, 2019. Paper doi bibtex @article{DBLP:journals/compsec/Uruena-LopezMNM19,
author = {Alberto Urue{\~{n}}a{-}L{\'{o}}pez and
Fernando Mateo and
Julio Nav{\'{\i}}o{-}Marco and
Jos{\'{e}} Mar{\'{\i}}a Mart{\'{\i}}nez{-}Mart{\'{\i}}nez and
Juan G{\'{o}}mez{-}Sanch{\'{\i}}s and
Joan Vila{-}Franc{\'{e}}s and
Antonio Jos{\'{e}} Serrano{-}L{\'{o}}pez},
title = {Analysis of computer user behavior, security incidents and fraud using
Self-Organizing Maps},
journal = {Comput. Secur.},
volume = {83},
pages = {38--51},
year = {2019},
url = {https://doi.org/10.1016/j.cose.2019.01.009},
doi = {10.1016/j.cose.2019.01.009},
timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/compsec/Uruena-LopezMNM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"cE4WngCrAdzFoKdoC","bibbaseid":"uruealpez-mateo-navomarco-martnezmartnez-gmezsanchs-vilafrancs-serranolpez-analysisofcomputeruserbehaviorsecurityincidentsandfraudusingselforganizingmaps-2019","authorIDs":[],"author_short":["Urueña-López, A.","Mateo, F.","Navío-Marco, J.","Martínez-Martínez, J. M.","Gómez-Sanchís, J.","Vila-Francés, J.","Serrano-López, A. J."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Alberto"],"propositions":[],"lastnames":["Urueña-López"],"suffixes":[]},{"firstnames":["Fernando"],"propositions":[],"lastnames":["Mateo"],"suffixes":[]},{"firstnames":["Julio"],"propositions":[],"lastnames":["Navío-Marco"],"suffixes":[]},{"firstnames":["José","María"],"propositions":[],"lastnames":["Martínez-Martínez"],"suffixes":[]},{"firstnames":["Juan"],"propositions":[],"lastnames":["Gómez-Sanchís"],"suffixes":[]},{"firstnames":["Joan"],"propositions":[],"lastnames":["Vila-Francés"],"suffixes":[]},{"firstnames":["Antonio","José"],"propositions":[],"lastnames":["Serrano-López"],"suffixes":[]}],"title":"Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps","journal":"Comput. Secur.","volume":"83","pages":"38–51","year":"2019","url":"https://doi.org/10.1016/j.cose.2019.01.009","doi":"10.1016/j.cose.2019.01.009","timestamp":"Thu, 20 Feb 2020 00:00:00 +0100","biburl":"https://dblp.org/rec/journals/compsec/Uruena-LopezMNM19.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/compsec/Uruena-LopezMNM19,\n author = {Alberto Urue{\\~{n}}a{-}L{\\'{o}}pez and\n Fernando Mateo and\n Julio Nav{\\'{\\i}}o{-}Marco and\n Jos{\\'{e}} Mar{\\'{\\i}}a Mart{\\'{\\i}}nez{-}Mart{\\'{\\i}}nez and\n Juan G{\\'{o}}mez{-}Sanch{\\'{\\i}}s and\n Joan Vila{-}Franc{\\'{e}}s and\n Antonio Jos{\\'{e}} Serrano{-}L{\\'{o}}pez},\n title = {Analysis of computer user behavior, security incidents and fraud using\n Self-Organizing Maps},\n journal = {Comput. Secur.},\n volume = {83},\n pages = {38--51},\n year = {2019},\n url = {https://doi.org/10.1016/j.cose.2019.01.009},\n doi = {10.1016/j.cose.2019.01.009},\n timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/compsec/Uruena-LopezMNM19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Urueña-López, A.","Mateo, F.","Navío-Marco, J.","Martínez-Martínez, J. M.","Gómez-Sanchís, J.","Vila-Francés, J.","Serrano-López, A. J."],"key":"DBLP:journals/compsec/Uruena-LopezMNM19","id":"DBLP:journals/compsec/Uruena-LopezMNM19","bibbaseid":"uruealpez-mateo-navomarco-martnezmartnez-gmezsanchs-vilafrancs-serranolpez-analysisofcomputeruserbehaviorsecurityincidentsandfraudusingselforganizingmaps-2019","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.cose.2019.01.009"},"downloads":0},"bibtype":"article","biburl":"https://dblp.org/search/publ/api?format=bib&h=1000&q=author:José_R._Álvarez:|author:Margarita_Bachiller:|author:Margarita_Bachiller_Mayoral:|author:Enrique_J._Carmona:|author:José_Manuel_Cuadra_Troncoso:|author:José_Luis_Fernández-Vindel:|author:Carolina_Mañoso:|author:Rafael_Martínez-Tomás:|author:Félix_de_la_Paz:|author:Angel_Pérez_de_Madrid:|author:Mariano_Rincón:|author:Miguel_Romero_0003:|author:Miguel_Romero_Hortelano:","creationDate":"2020-09-24T15:30:19.576Z","downloads":0,"keywords":[],"search_terms":["analysis","computer","user","behavior","security","incidents","fraud","using","self","organizing","maps","urueña-lópez","mateo","navío-marco","martínez-martínez","gómez-sanchís","vila-francés","serrano-lópez"],"title":"Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps","year":2019,"dataSources":["jY3Qd7SvX7QP2zSXh"]}