Login / Signup
Workshop report: darkspace and unsolicited traffic analysis (DUST 2012).
Tanja Zseby
kc claffy
Published in:
Comput. Commun. Rev. (2012)
Keyphrases
</>
traffic analysis
network security
network traffic
email
spam filtering
traffic data
internet traffic
genetic algorithm
search algorithm
communication patterns