Atıf Formatları
An approach to custom privacy policy violation detection problems using big social provenance data
  • IEEE
  • ACM
  • APA
  • Chicago
  • MLA
  • Harvard
  • BibTeX

M. J. Baeth And M. S. Aktaş, "An approach to custom privacy policy violation detection problems using big social provenance data," CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , vol.30, 2018

Baeth, M. J. And Aktaş, M. S. 2018. An approach to custom privacy policy violation detection problems using big social provenance data. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , vol.30 .

Baeth, M. J., & Aktaş, M. S., (2018). An approach to custom privacy policy violation detection problems using big social provenance data. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , vol.30.

Baeth, Mohamed, And Mehmet Sıddık AKTAŞ. "An approach to custom privacy policy violation detection problems using big social provenance data," CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , vol.30, 2018

Baeth, Mohamed J. And Aktaş, Mehmet S. . "An approach to custom privacy policy violation detection problems using big social provenance data." CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , vol.30, 2018

Baeth, M. J. And Aktaş, M. S. (2018) . "An approach to custom privacy policy violation detection problems using big social provenance data." CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , vol.30.

@article{article, author={Mohamed Jehad Baeth And author={Mehmet Sıddık AKTAŞ}, title={An approach to custom privacy policy violation detection problems using big social provenance data}, journal={CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE}, year=2018}