1.
Caminha C, Furtado V. Using Complex Networks for Mining Malicious Activities in a Collaborative Map. JIDM [Internet]. 2012Oct.15 [cited 2024Nov.22];3(3):179. Available from: https://journals-sol.sbc.org.br/index.php/jidm/article/view/1447