|
ACCESS THE FULL ARTICLE
No SPIE Account? Create one
![Lens.org Logo](/images/Lens.org/lens-logo.png)
CITATIONS
Cited by 2 scholarly publications.
Social networks
Computer intrusion detection
Social network analysis
Matrices
Network security
Rule based systems
Data mining