Year | DOI | Venue |
---|---|---|
2012 | 10.1007/978-3-642-35130-3_16 | ICISS |
Field | DocType | Citations |
Data mining,Graph,Computer security,Computer science,Harm,Insider threat,Data integrity,Dependency graph,Data flow diagram | Conference | 2 |
PageRank | References | Authors |
0.39 | 10 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Weihan Li | 1 | 3 | 1.10 |
Brajendra Panda | 2 | 331 | 39.58 |
Qussai Yaseen | 3 | 104 | 12.37 |