Amanote Research

Amanote Research

    RegisterSign In

Identifying Suspicious Activities Through DNS Failure Graph Analysis

doi 10.1109/icnp.2010.5762763
Full Text
Open PDF
Abstract

Available in full text

Date

October 1, 2010

Authors
Nan JiangJin CaoYu JinLi Erran LiZhi-Li Zhang
Publisher

IEEE


Related search

Identifying Suspicious Efficient Units in DEA Models

Doklady Mathematics
Mathematics
2013English

Recognizing and Localizing Individual Activities Through Graph Matching

2010English

Identifying Arthralgia Suspicious for Progression to Rheumatoid Arthritis

Annals of the Rheumatic Diseases
ImmunologyMolecular BiologyBiochemistryRheumatologyAllergyGenetics
2016English

Identifying Suspicious Bodies? Historically Tracing Criminal Identification Technologies in Portugal

Surveillance & Society
Safety ResearchUrban Studies
2020English

Identifying Network Structure Similarity Using Spectral Graph Theory

Applied Network Science
Computational MathematicsCommunicationsMultidisciplinaryComputer Networks
2018English

Monitoring User-System Interactions Through Graph-Based Intrinsic Dynamics Analysis

2013English

Summary of Failure Analysis Activities at Brookhaven National Laboratory

1996English

Anomaly Analysis on an Open DNS Dataset

2018English

Structural Analysis of Dynamic-Controlled Jet Using DNS

Journal of Fluid Science and Technology
Transfer ProcessesFluid FlowMechanical Engineering
2014English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy