Login / Signup
Identifying suspicious activities through DNS failure graph analysis.
Nan Jiang
Jin Cao
Yu Jin
Erran L. Li
Zhi-Li Zhang
Published in:
ICNP (2010)
Keyphrases
</>
image analysis
random walk
quantitative analysis
databases
genetic algorithm
data structure
data analysis
complex networks
directed graph
graph structure