Amanote Research
Register
Sign In
Identifying Suspicious Activities Through DNS Failure Graph Analysis
doi 10.1109/icnp.2010.5762763
Full Text
Open PDF
Abstract
Available in
full text
Date
October 1, 2010
Authors
Nan Jiang
Jin Cao
Yu Jin
Li Erran Li
Zhi-Li Zhang
Publisher
IEEE
Related search
Identifying Suspicious Efficient Units in DEA Models
Doklady Mathematics
Mathematics
Recognizing and Localizing Individual Activities Through Graph Matching
Identifying Arthralgia Suspicious for Progression to Rheumatoid Arthritis
Annals of the Rheumatic Diseases
Immunology
Molecular Biology
Biochemistry
Rheumatology
Allergy
Genetics
Identifying Suspicious Bodies? Historically Tracing Criminal Identification Technologies in Portugal
Surveillance & Society
Safety Research
Urban Studies
Identifying Network Structure Similarity Using Spectral Graph Theory
Applied Network Science
Computational Mathematics
Communications
Multidisciplinary
Computer Networks
Monitoring User-System Interactions Through Graph-Based Intrinsic Dynamics Analysis
Summary of Failure Analysis Activities at Brookhaven National Laboratory
Anomaly Analysis on an Open DNS Dataset
Structural Analysis of Dynamic-Controlled Jet Using DNS
Journal of Fluid Science and Technology
Transfer Processes
Fluid Flow
Mechanical Engineering