Login / Signup

Workshop report: darkspace and unsolicited traffic analysis (DUST 2012).

Tanja Zsebykc claffy
Published in: Comput. Commun. Rev. (2012)
Keyphrases
  • traffic analysis
  • network security
  • network traffic
  • email
  • spam filtering
  • traffic data
  • internet traffic
  • genetic algorithm
  • search algorithm
  • communication patterns