Author:
Thuraisingham Bhavani,Khan Latifur,Awad Mamoun,Wang Lei
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Data Mining for Security Applications;Big Data Analytics with Applications in Insider Threat Detection;2017-11-22
2. Hierarchical models for multiple, rare outcomes using massive observational healthcare databases;Statistical Analysis and Data Mining: The ASA Data Science Journal;2016-07-17
3. Introduction;Analyzing and Securing Social Networks;2016-04-06
4. Appendix A: Data Management Systems, Developments, and Trends;Secure Data Provenance and Inference Control with Semantic Web;2014-07-22
5. Security as a Service;Developing and Securing the Cloud;2013-10-28