Author:
Gai Keke,Qiu Meikang,Sun Xiaotong
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference150 articles.
1. Trust, security and privacy in emerging distributed systems;Abawajy;Future Gener. Comput. Syst.,2016
2. A survey of anomaly detection techniques in financial domain;Ahmed;Future Gener. Comput. Syst.,2016
3. Asamoah, C., Tao, L., Gai, K., Jiang, N., 2016. Powering filtration process of cyber security ecosystem using knowledge graph. In: Proceedings of the 2nd IEEE International Conference of Scalable and Smart Cloud, pp. 240–246.
4. Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario;Banu;Inf. Sci.,2013
5. Understanding interfirm relationships in business ecosystems with interactive visualization;Basole;IEEE Trans. Vis. Comput. Graph.,2013
Cited by
325 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献