How to configure cyber chains via competence networks.
Joachim BerlakVolker WeberPublished in: Bus. Process. Manag. J. (2004)
Keyphrases
- data sets
- telecommunication networks
- social networks
- complex networks
- computer networks
- identity theft
- heterogeneous networks
- network design
- network model
- network analysis
- communication networks
- community structure
- network structure
- artificial neural networks
- multi agent
- website
- search engine
- genetic algorithm
- real world