(1)
Caminha, C.; Furtado, V. Using Complex Networks for Mining Malicious Activities in a Collaborative Map. JIDM 2012, 3, 179.