Login / Signup

An approach to custom privacy policy violation detection problems using big social provenance data.

Mohamed Jehad BaethMehmet S. Aktas
Published in: Concurr. Comput. Pract. Exp. (2018)
Keyphrases