[1]
C. Caminha and V. Furtado, “Using Complex Networks for Mining Malicious Activities in a Collaborative Map”, JIDM, vol. 3, no. 3, p. 179, Oct. 2012.