DOCUMENT RESOURCES FOR EVERYONE
Technology A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS

1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.1, January 2013 A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONS Yong…