30.10.2012 Views

Proceedings of the Seventh Mountain Lion Workshop

Proceedings of the Seventh Mountain Lion Workshop

Proceedings of the Seventh Mountain Lion Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>the</strong> rate <strong>of</strong> detection <strong>of</strong> attacks and changes<br />

in verification <strong>of</strong> detected attacks.<br />

We did subject <strong>the</strong> Beier-quality data to<br />

2 Chi-square comparisons with 27 <strong>of</strong> <strong>the</strong><br />

accounts that were not verified, but met<br />

o<strong>the</strong>r Beier criteria. These are <strong>the</strong> same data<br />

shown in Figure 1. We used <strong>the</strong> Beierquality<br />

data as <strong>the</strong> observed value and <strong>the</strong><br />

non-verified non-fatal data, paired with <strong>the</strong><br />

Beier-quality data by decades, as <strong>the</strong><br />

expected value. The Beier- quality fatal data<br />

were not different from <strong>the</strong> non-verified,<br />

non-fatal data (χ 2 = 13.7, 10 df, P =

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!