Cited By
View all- Deb NChakraborty MChaki NChaki NChaki R(2014)Honesty and Trust-Based IDS SolutionsIntrusion Detection in Wireless Ad-Hoc Networks10.1201/b16394-6(111-146)Online publication date: 9-Jan-2014
- Deb NChaki N(2012)TIDSProceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management10.1007/978-3-642-33260-9_6(80-91)Online publication date: 26-Sep-2012
- Chang WChang J(2011)A novel two-stage phased modeling framework for early fraud detection in online auctionsExpert Systems with Applications: An International Journal10.1016/j.eswa.2011.02.17238:9(11244-11260)Online publication date: 1-Sep-2011
- Show More Cited By