- A framework for privacy aware data management in relational databases
- Information assurance: a cyber security storm map
- Using non-verbal social signals and degree centrality to optimise a covert actor's detection scheme for a healthy networked community
- A computational framework for detecting malicious actors in communities
No comments:
Post a Comment
Note: only a member of this blog may post a comment.