Return to Article Details Using Complex Networks for Mining Malicious Activities in a Collaborative Map Download Download PDF