메뉴 건너뛰기




Volumn 39, Issue 18, 2012, Pages 13462-13471

Improved multilevel security with latent semantic indexing

Author keywords

Data protection; Decision support; Information security; Multilevel security; Text mining

Indexed keywords

AUTHORIZED USERS; DATA PROTECTION; DECISION SUPPORTS; ERROR PRONES; LATENT SEMANTIC INDEXING; MULTI-LEVEL SECURITY; PROTECT INFORMATION; SECURITY LABEL; TEXT MINING; TEXTUAL INFORMATION;

EID: 84865269030     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2012.06.002     Document Type: Article
Times cited : (17)

References (89)
  • 4
    • 84863086968 scopus 로고    scopus 로고
    • Including spatial interdependence in customer acquisition models: A cross-category comparison
    • P. Baecke, and D. Van den Poel Including spatial interdependence in customer acquisition models: A cross-category comparison Expert Systems with Applications 39 15 2012 12105 12113
    • (2012) Expert Systems with Applications , vol.39 , Issue.15 , pp. 12105-12113
    • Baecke, P.1    Van Den Poel, D.2
  • 7
    • 84861347296 scopus 로고    scopus 로고
    • Improving customer retention in financial services using kinship network information
    • D.F. Benoit, and D. Van den Poel Improving customer retention in financial services using kinship network information Expert Systems with Applications 39 13 2012 11435 11442
    • (2012) Expert Systems with Applications , vol.39 , Issue.13 , pp. 11435-11442
    • Benoit, D.F.1    Van Den Poel, D.2
  • 9
    • 61349134071 scopus 로고    scopus 로고
    • Assessment of information impacts in power system security against malicious attacks in a general framework
    • E. Bompard, R. Napoli, and F. Xue Assessment of information impacts in power system security against malicious attacks in a general framework Reliability Engineering & System Safety 94 6 2009 1087 1094
    • (2009) Reliability Engineering & System Safety , vol.94 , Issue.6 , pp. 1087-1094
    • Bompard, E.1    Napoli, R.2    Xue, F.3
  • 10
    • 84865259099 scopus 로고    scopus 로고
    • Married women's lifestyles in Japan: Disparities based on the number of children
    • Y. Cao, S. Matsumoto, and T. Murata Married women's lifestyles in Japan: Disparities based on the number of children The Review of Socionetwork Strategies 6 1 2012 1 14
    • (2012) The Review of Socionetwork Strategies , vol.6 , Issue.1 , pp. 1-14
    • Cao, Y.1    Matsumoto, S.2    Murata, T.3
  • 11
    • 0024135474 scopus 로고
    • Implementing multilevel security by violation privilege
    • J.M. Carroll Implementing multilevel security by violation privilege Computers & Security 7 6 1988 563 573
    • (1988) Computers & Security , vol.7 , Issue.6 , pp. 563-573
    • Carroll, J.M.1
  • 13
    • 17844377335 scopus 로고    scopus 로고
    • Mining changes in customer behavior in retail marketing
    • M.C. Chen, A.L. Chiu, and H.H. Chang Mining changes in customer behavior in retail marketing Expert System with Applications 28 4 2005 773 781
    • (2005) Expert System with Applications , vol.28 , Issue.4 , pp. 773-781
    • Chen, M.C.1    Chiu, A.L.2    Chang, H.H.3
  • 14
    • 0011588485 scopus 로고
    • Trusted products evaluation
    • S. Chokhani Trusted products evaluation Communication of the ACM 35 7 1992 64 76
    • (1992) Communication of the ACM , vol.35 , Issue.7 , pp. 64-76
    • Chokhani, S.1
  • 15
    • 33645164231 scopus 로고    scopus 로고
    • Managing role relationships in an information flow control model
    • S.C. Chou, and Y.C. Chen Managing role relationships in an information flow control model Journal of Systems and Software 79 4 2006 507 522
    • (2006) Journal of Systems and Software , vol.79 , Issue.4 , pp. 507-522
    • Chou, S.C.1    Chen, Y.C.2
  • 16
    • 84859215151 scopus 로고    scopus 로고
    • Using latent topics to enhance search and recommendation in enterprise social software
    • K. Christidis, G. Mentzas, and D. Apostolou Using latent topics to enhance search and recommendation in enterprise social software Expert Systems with Applications 39 10 2012 9297 9307
    • (2012) Expert Systems with Applications , vol.39 , Issue.10 , pp. 9297-9307
    • Christidis, K.1    Mentzas, G.2    Apostolou, D.3
  • 17
    • 84857651191 scopus 로고    scopus 로고
    • Reconciling performance and interpretability in customer churn prediction using ensemble learning based on generalized additive models
    • K.W. De Bock, and D. Van den Poel Reconciling performance and interpretability in customer churn prediction using ensemble learning based on generalized additive models Expert Systems with Applications 39 8 2012 6816 6826
    • (2012) Expert Systems with Applications , vol.39 , Issue.8 , pp. 6816-6826
    • De Bock, K.W.1    Van Den Poel, D.2
  • 19
    • 0023710206 scopus 로고
    • Comparing the areas under two or more correlated receiver operating characteristic curves: A nonparametric approach
    • E.R. DeLong, D.M. DeLong, and D.L. Clarke-Pearson Comparing the areas under two or more correlated receiver operating characteristic curves: A nonparametric approach Biometrics 44 3 1988 837 845
    • (1988) Biometrics , vol.44 , Issue.3 , pp. 837-845
    • Delong, E.R.1    Delong, D.M.2    Clarke-Pearson, D.L.3
  • 20
    • 79954555301 scopus 로고    scopus 로고
    • Do you have the right security?
    • M. Dubash Do you have the right security? Computer Fraud & Security 2011 3 2011 14 16
    • (2011) Computer Fraud & Security , vol.2011 , Issue.3 , pp. 14-16
    • Dubash, M.1
  • 24
    • 63849136022 scopus 로고    scopus 로고
    • Vertrauliche Verarbeitung staatlich eingestufter Information-die Informationstechnologie im Geheimschutz
    • W. Gericke, D. Thorleuchter, G. Weck, F. Reiländer, and D. Loß Vertrauliche Verarbeitung staatlich eingestufter Information-die Informationstechnologie im Geheimschutz Informatik Spektrum 32 2 2009 102 109
    • (2009) Informatik Spektrum , vol.32 , Issue.2 , pp. 102-109
    • Gericke, W.1    Thorleuchter, D.2    Weck, G.3    Reiländer, F.4    Loß, D.5
  • 25
    • 0032263984 scopus 로고    scopus 로고
    • A theory of term weighting based on exploratory data analysis
    • W.R. Greiff A theory of term weighting based on exploratory data analysis W.B. Croft, A. Moffat, C.J. van Rijsbergen, R. Wilkinson, J. Zobel, Proceedings of the 21st SIGIR Conference 1998 ACM New York 11 19
    • (1998) Proceedings of the 21st SIGIR Conference , pp. 11-19
    • Greiff, W.R.1
  • 26
    • 0030096972 scopus 로고    scopus 로고
    • Comparison of receiver operating characteristic curves on the basis of optimal operating points
    • E.J. Halpern, M. Albert, A.M. Krieger, C.E. Metz, and A.D. Maidment Comparison of receiver operating characteristic curves on the basis of optimal operating points Academic Radiology 3 3 1996 245 253
    • (1996) Academic Radiology , vol.3 , Issue.3 , pp. 245-253
    • Halpern, E.J.1    Albert, M.2    Krieger, A.M.3    Metz, C.E.4    Maidment, A.D.5
  • 27
    • 0020083498 scopus 로고
    • The meaning and use of the area under a receiver operating characteristic (ROC) curve
    • J.A. Hanley, and B.J. McNeil The meaning and use of the area under a receiver operating characteristic (ROC) curve Radiology 143 1 1982 29 36 (Pubitemid 12142173)
    • (1982) Radiology , vol.143 , Issue.1 , pp. 29-36
    • Hanley, J.A.1    McNeil, B.J.2
  • 28
    • 78449301618 scopus 로고    scopus 로고
    • Classifying data from protected statistical datasets
    • J. Herranza, S. Matwin, J. Nind, and V. Torra Classifying data from protected statistical datasets Computer and Security 29 8 2010 875 890
    • (2010) Computer and Security , vol.29 , Issue.8 , pp. 875-890
    • Herranza, J.1    Matwin, S.2    Nind, J.3    Torra, V.4
  • 29
    • 0036927958 scopus 로고    scopus 로고
    • Differentally secure multicasting and its implementation methods
    • S. Holeman, G. Manimaron, J. Davis, and A. Chakrabarti Differentally secure multicasting and its implementation methods Computer Security 21 8 2002 736 749
    • (2002) Computer Security , vol.21 , Issue.8 , pp. 736-749
    • Holeman, S.1    Manimaron, G.2    Davis, J.3    Chakrabarti, A.4
  • 31
    • 84864999914 scopus 로고    scopus 로고
    • The effects of proposals for basic pension reform on the income distribution of the elderly in Japan
    • S. Inagaki The effects of proposals for basic pension reform on the income distribution of the elderly in Japan The Review of Socionetwork Strategies 4 1 2010 1 16
    • (2010) The Review of Socionetwork Strategies , vol.4 , Issue.1 , pp. 1-16
    • Inagaki, S.1
  • 32
    • 0012699391 scopus 로고    scopus 로고
    • Mining consumer product data via latent semantic indexing
    • DOI 10.1016/S1088-467X(99)00029-3
    • J. Jiang, M.W. Berry, J.M. Donato, G. Ostrouchov, and N.W. Grady Mining consumer product data via latent semantic indexing Intelligent Data Analysis 3 5 1999 377 398 (Pubitemid 33260722)
    • (1999) Intelligent data analysis , vol.3 , Issue.5 , pp. 377-398
    • Jiang, J.1    Berry, M.W.2    Donato, J.M.3    Ostrouchov, G.4    Grady, N.W.5
  • 33
    • 84953744816 scopus 로고
    • A statistical interpretation of term specificity and its application in retrieval
    • K.S. Jones A statistical interpretation of term specificity and its application in retrieval Journal of Documentation 28 1 1972 11 21
    • (1972) Journal of Documentation , vol.28 , Issue.1 , pp. 11-21
    • Jones, K.S.1
  • 34
    • 33750374206 scopus 로고    scopus 로고
    • A taxonomy and comparison of computer security incidents from the commercial and government sectors
    • DOI 10.1016/j.cose.2006.08.004, PII S0167404806001234
    • M. Kjaerland A taxonomy and comparison of computer security incidents from the commercial and government sectors Computers & Security 25 7 2006 522 538 (Pubitemid 44634763)
    • (2006) Computers and Security , vol.25 , Issue.7 , pp. 522-538
    • Kjaerland, M.1
  • 35
    • 55949121544 scopus 로고    scopus 로고
    • Text classification from unlabeled documents with bootstrapping and feature projection techniques
    • Y. Ko, and J. Seo Text classification from unlabeled documents with bootstrapping and feature projection techniques Information Processing & Management 45 1 2009 70 83
    • (2009) Information Processing & Management , vol.45 , Issue.1 , pp. 70-83
    • Ko, Y.1    Seo, J.2
  • 36
    • 0019608720 scopus 로고
    • Formal models for computer security
    • C.E. Landwehr Formal models for computer security Computing Surveys 13 3 1981
    • (1981) Computing Surveys , vol.13 , Issue.3
    • Landwehr, C.E.1
  • 37
    • 84862808238 scopus 로고    scopus 로고
    • An information fusion approach to integrate image annotation and text mining methods for geographic knowledge discovery
    • C.H. Lee, and S.H. Wang An information fusion approach to integrate image annotation and text mining methods for geographic knowledge discovery Expert Systems with Applications 39 10 2012 8954 8967
    • (2012) Expert Systems with Applications , vol.39 , Issue.10 , pp. 8954-8967
    • Lee, C.H.1    Wang, S.H.2
  • 38
    • 33846794857 scopus 로고    scopus 로고
    • Access control in collaborative commerce
    • DOI 10.1016/j.dss.2005.05.022, PII S0167923605000874
    • E.Y. Li, T.C. Du, and J.W. Wong Access control in collaborative commerce Decision Support Systems 43 2007 675 685 (Pubitemid 46216536)
    • (2007) Decision Support Systems , vol.43 , Issue.2 , pp. 675-685
    • Li, E.Y.1    Du, T.C.2    Wong, J.W.3
  • 39
    • 84865232323 scopus 로고    scopus 로고
    • Opportunities for crossing the chasm between early adopters and the early majority through new uses of innovative products
    • M. -H. Lin, and C. -F. Hong Opportunities for crossing the chasm between early adopters and the early majority through new uses of innovative products The Review of Socionetwork Strategies 5 2 2011 27 42
    • (2011) The Review of Socionetwork Strategies , vol.5 , Issue.2 , pp. 27-42
    • L, M.-H.1    H, C.-F.2
  • 41
    • 0024607892 scopus 로고
    • Access control policies: Some unanswered questions
    • T.F. Lunt Access control policies: Some unanswered questions Computers & Security 8 1 1989 43 54
    • (1989) Computers & Security , vol.8 , Issue.1 , pp. 43-54
    • Lunt, T.F.1
  • 42
    • 79958001937 scopus 로고    scopus 로고
    • A semantic term weighting scheme for text categorization
    • Q. Luo, E. Chen, and H. Xiong A semantic term weighting scheme for text categorization Expert Systems with Applications 38 10 2011 12708 12716
    • (2011) Expert Systems with Applications , vol.38 , Issue.10 , pp. 12708-12716
    • Luo, Q.1    Chen, E.2    Xiong, H.3
  • 44
    • 80051804223 scopus 로고    scopus 로고
    • Modeling behavioral considerations related to information security
    • I.J. Martinez-Moyano, S.H. Conrad, and D.F. Andersen Modeling behavioral considerations related to information security Computers & Security 30 6-7 2011 397 409
    • (2011) Computers & Security , vol.30 , Issue.67 , pp. 397-409
    • Martinez-Moyano, I.J.1    Conrad, S.H.2    Andersen, D.F.3
  • 45
    • 0022012611 scopus 로고
    • A comment on the basic security theorem of Bell and LaPadula
    • J. McLean A comment on the basic security theorem of Bell and LaPadula Information Process Letter 20 1985
    • (1985) Information Process Letter , vol.20
    • McLean, J.1
  • 47
    • 42749086128 scopus 로고    scopus 로고
    • Detection of unknown computer worms based on behavioral classification of the host
    • R. Moskovitch, Y. Elovici, and L. Rokach Detection of unknown computer worms based on behavioral classification of the host Computational Statistics & Data Analysis 52 9 2008 4544 4566
    • (2008) Computational Statistics & Data Analysis , vol.52 , Issue.9 , pp. 4544-4566
    • Moskovitch, R.1    Elovici, Y.2    Rokach, L.3
  • 49
    • 77956393826 scopus 로고    scopus 로고
    • Network anomaly detection through nonlinear analysis
    • F. Palmieri, and U. Fiore Network anomaly detection through nonlinear analysis Computer Security 29 2010 737 755
    • (2010) Computer Security , vol.29 , pp. 737-755
    • Palmieri, F.1    Fiore, U.2
  • 50
    • 84862777391 scopus 로고    scopus 로고
    • A literature review and classification of recommender systems research
    • D.H. Park, H.K. Kim, I.Y. Choi, and J.K. Kim A literature review and classification of recommender systems research Expert Systems with Applications 39 11 2012 10059 10072
    • (2012) Expert Systems with Applications , vol.39 , Issue.11 , pp. 10059-10072
    • Park, D.H.1    Kim, H.K.2    Choi, I.Y.3    Kim, J.K.4
  • 51
    • 77949562741 scopus 로고    scopus 로고
    • A framework of composable access control features: Preserving separation of access control concerns from models to code
    • J.A. Pavlich-Mariscal, S.A. Demurjian, and L.D. Michel A framework of composable access control features: Preserving separation of access control concerns from models to code Computers & Security 29 3 2010 350 379
    • (2010) Computers & Security , vol.29 , Issue.3 , pp. 350-379
    • Pavlich-Mariscal, J.A.1    Demurjian, S.A.2    Michel, L.D.3
  • 53
    • 84948481845 scopus 로고
    • An algorithm for suffix stripping
    • M.F. Porter An algorithm for suffix stripping Program 14 3 1980 130 137
    • (1980) Program , vol.14 , Issue.3 , pp. 130-137
    • Porter, M.F.1
  • 54
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J.H. Saltzer, and M.D. Schroeder The protection of information in computer systems Proceedings of the IEEE 63 9 1975 1278 1308
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 55
    • 84976664060 scopus 로고
    • Automatic structuring and retrieval of large text files
    • G. Salton, J. Allan, and C. Buckley Automatic structuring and retrieval of large text files Communications of the ACM 37 2 1994 97 108
    • (1994) Communications of the ACM , vol.37 , Issue.2 , pp. 97-108
    • Salton, G.1    Allan, J.2    Buckley, C.3
  • 56
    • 45549117987 scopus 로고
    • Term-weighting approaches in automatic text retrieval
    • G. Salton, and C. Buckley Term-weighting approaches in automatic text retrieval Information Processing & Management 24 5 1988 513 523
    • (1988) Information Processing & Management , vol.24 , Issue.5 , pp. 513-523
    • Salton, G.1    Buckley, C.2
  • 57
    • 84861100364 scopus 로고    scopus 로고
    • Dynamic risk-based decision methods for access control systems
    • Shaikh, R. A.; Adi, K.; & Logrippo, L. (2012). Dynamic risk-based decision methods for access control systems. Computers & Security.
    • (2012) Computers & Security
    • Shaikh, R.A.1    Adi, K.2    Logrippo, L.3
  • 58
    • 84859215235 scopus 로고    scopus 로고
    • User-oriented ontology-based clustering of stored memories
    • L. Shi, and R. Setchi User-oriented ontology-based clustering of stored memories Expert Systems with Applications 39 10 2012 9730 9742
    • (2012) Expert Systems with Applications , vol.39 , Issue.10 , pp. 9730-9742
    • Shi, L.1    Setchi, R.2
  • 61
    • 84865243746 scopus 로고    scopus 로고
    • An emergency evacuation planning model using the universally quickest flow
    • A. Takizawa, M. Inoue, and N. Katoh An emergency evacuation planning model using the universally quickest flow The Review of Socionetwork Strategies 6 1 2012 15 28
    • (2012) The Review of Socionetwork Strategies , vol.6 , Issue.1 , pp. 15-28
    • Takizawa, A.1    Inoue, M.2    Katoh, N.3
  • 62
    • 84879575209 scopus 로고    scopus 로고
    • Finding technological ideas and inventions with text mining and technique philosophy
    • D. Thorleuchter Finding technological ideas and inventions with text mining and technique philosophy C. Preisach, H. Burkhardt, L. Schmidt-Thieme, R. Decker, Data analysis, machine learning, and applications 2008 Springer Berlin 413 420
    • (2008) Data Analysis, Machine Learning, and Applications , pp. 413-420
    • Thorleuchter, D.1
  • 64
    • 77955034444 scopus 로고    scopus 로고
    • A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies
    • D. Thorleuchter, D. Van den Poel, and A. Prinzie A compared R&D-based and patent-based cross impact analysis for identifying relationships between technologies Technological Forecasting and Social Change 77 7 2010 1037 1050
    • (2010) Technological Forecasting and Social Change , vol.77 , Issue.7 , pp. 1037-1050
    • Thorleuchter, D.1    Van Den Poel, D.2    Prinzie, A.3
  • 65
    • 77952121800 scopus 로고    scopus 로고
    • Extracting consumers needs for new products-A web mining approach
    • IEEE Computer Society Los Alamitos
    • D. Thorleuchter, D. Van den Poel, and A. Prinzie Extracting consumers needs for new products-A web mining approach Proceedings WKDD 2010 2010 IEEE Computer Society Los Alamitos 441
    • (2010) Proceedings WKDD 2010 , pp. 441
    • Thorleuchter, D.1    Van Den Poel, D.2    Prinzie, A.3
  • 66
    • 84879593170 scopus 로고    scopus 로고
    • Mining innovative ideas to support new product research and development
    • D. Thorleuchter, D. Van den Poel, and A. Prinzie Mining innovative ideas to support new product research and development H. Locarek-Junge, C. Weihs, Classification as a tool for research 2010 Springer Berlin 587 594
    • (2010) Classification As A Tool for Research , pp. 587-594
    • Thorleuchter, D.1    Van Den Poel, D.2    Prinzie, A.3
  • 72
    • 84864935139 scopus 로고    scopus 로고
    • Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing
    • D. Thorleuchter, D. Van den Poel, and A. Prinzie Analyzing existing customers' websites to improve the customer acquisition process as well as the profitability prediction in B-to-B marketing Expert Systems with Applications 39 3 2012 2597 2605
    • (2012) Expert Systems with Applications , vol.39 , Issue.3 , pp. 2597-2605
    • Thorleuchter, D.1    Van Den Poel, D.2    Prinzie, A.3
  • 75
    • 84874809994 scopus 로고    scopus 로고
    • Using webcrawling of publicly-available websites to assess e-commerce relationships
    • IEEE New York
    • D. Thorleuchter, and D. Van den Poel Using webcrawling of publicly-available websites to assess e-commerce relationships SRII Global Conference 2012 2012 IEEE New York
    • (2012) SRII Global Conference 2012
    • Thorleuchter, D.1    Van Den Poel, D.2
  • 77
    • 84865034916 scopus 로고    scopus 로고
    • Predicting e-commerce company success by mining the text of its publicly-accessible website
    • Thorleuchter, D.; & Van den Poel, D. (2012e). Predicting e-commerce company success by mining the text of its publicly-accessible website. Expert Systems with Applications. http://dx.doi.org/10.1016/j.eswa.2012.05.096.
    • (2012) Expert Systems with Applications
    • Thorleuchter, D.1    Van Den Poel, D.2
  • 79
  • 80
  • 81
    • 84858337533 scopus 로고    scopus 로고
    • Global data mining: An empirical study of current trends, future forecasts and technology diffusions
    • H.H. Tsai Global data mining: An empirical study of current trends, future forecasts and technology diffusions Expert Systems with Applications 39 9 2012 8172 8181
    • (2012) Expert Systems with Applications , vol.39 , Issue.9 , pp. 8172-8181
    • Tsai, H.H.1
  • 82
    • 84865261911 scopus 로고    scopus 로고
    • Correlation and regression analysis for characterizations of a university hospital
    • Y. Tsumoto, and S. Tsumoto Correlation and regression analysis for characterizations of a university hospital The Review of Socionetwork Strategies 5 2 2011 43 55
    • (2011) The Review of Socionetwork Strategies , vol.5 , Issue.2 , pp. 43-55
    • Tsumoto, Y.1    Tsumoto, S.2
  • 83
    • 0032077905 scopus 로고    scopus 로고
    • Receiver operating characteristic (ROC) analysis: Basic principles and applications in radiology
    • DOI 10.1016/S0720-048X(97)00157-5, PII S0720048X97001575
    • A.R. Van Erkel, and P.M.T. Pattynama Receiver operating characteristic (ROC) analysis: Basic principles and applications in radiology European Journal of Radiology 27 2 1998 88 94 (Pubitemid 28234366)
    • (1998) European Journal of Radiology , vol.27 , Issue.2 , pp. 88-94
    • Van Erkel, A.R.1    Pattynama, P.M.T.2
  • 84
    • 0032624397 scopus 로고    scopus 로고
    • Managing multi level security in a military intranet environment
    • S.H. Von Solms, and J.H.S. Geldenhuys Managing multi level security in a military intranet environment Computers & Security 18 3 1999 257 270
    • (1999) Computers & Security , vol.18 , Issue.3 , pp. 257-270
    • Von Solms, S.H.1    Geldenhuys, J.H.S.2
  • 85
    • 0036299647 scopus 로고    scopus 로고
    • The development of access control policies for information technology systems
    • DOI 10.1016/S0167-4048(02)00414-5
    • P. Ward, and C.L. Smith The development of access control policies for information technology systems Computers & Security 21 4 2002 356 371 (Pubitemid 34715240)
    • (2002) Computers and Security , vol.21 , Issue.4 , pp. 356-371
    • Ward, P.1    Smith, C.L.2
  • 86
    • 53049094540 scopus 로고    scopus 로고
    • The need for information security education
    • M.A. Wright The need for information security education Computer Fraud & Security 1998 8 1998 14 17
    • (1998) Computer Fraud & Security , vol.1998 , Issue.8 , pp. 14-17
    • Wright, M.A.1
  • 87
    • 84862794793 scopus 로고    scopus 로고
    • Topics modeling based on selective Zipf distribution
    • J. Zeng, J. Duan, W. Cao, and C. Wu Topics modeling based on selective Zipf distribution Expert Systems with Applications 39 7 2012 6541 6546
    • (2012) Expert Systems with Applications , vol.39 , Issue.7 , pp. 6541-6546
    • Zeng, J.1    Duan, J.2    Cao, W.3    Wu, C.4
  • 88
    • 84862970802 scopus 로고    scopus 로고
    • Mediating secure information flow policies
    • G.Q. Zhang Mediating secure information flow policies Information and Computation 205 9 2007 1413 1425
    • (2007) Information and Computation , vol.205 , Issue.9 , pp. 1413-1425
    • Zhang, G.Q.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.