First Page | Document Content | |
---|---|---|
Date: 2013-05-27 15:45:47Network architecture Computer network security Spamming Internet protocols Multi-agent systems Botnet Conficker DNS spoofing NX technology Computing Internet Domain name system | Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing Srinivas Krishnan, Teryl Taylor, Fabian Monrose John McHughAdd to Reading ListSource URL: cs.unc.eduDownload Document from Source WebsiteFile Size: 1,43 MBShare Document on Facebook |