|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
CITATIONS
Cited by 2 scholarly publications.
Social networks
Computer intrusion detection
Social network analysis
Matrices
Network security
Rule based systems
Data mining