1.
Caminha C, Furtado V. Using Complex Networks for Mining Malicious Activities in a Collaborative Map. JIDM [Internet]. 2012Oct.15 [cited 2024Apr.26];3(3):179. Available from: https://sol.sbc.org.br/journals/index.php/jidm/article/view/1447