Author: Wilson Stephen
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.6, Iss.5, 1998-05, pp. : 218-220
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Web robot detection techniques: overview and limitations
By Doran Derek
Data Mining and Knowledge Discovery, Vol. 22, Iss. 1-2, 2011-01 ,pp. :
Review on Computational Trust and Reputation Models
Artificial Intelligence Review, Vol. 24, Iss. 1, 2005-09 ,pp. :