Login / Signup
Multi-factor combination authentication using fuzzy graph domination model.
Zehui Shao
Zepeng Li
Pu Wu
Lanxiang Chen
Xiaosong Zhang
Published in:
J. Intell. Fuzzy Syst. (2019)
Keyphrases
</>
computational model
mathematical model
experimental data
graph model
similarity measure
formal model
social networks
clustering algorithm
hidden markov models
em algorithm
statistical model
conceptual model
dependency graph