Advanced search
1 file | 260.37 KB Add to list

Protecting research and technology from espionage

Dirk Thorleuchter (UGent) and Dirk Van den Poel (UGent)
(2013) EXPERT SYSTEMS WITH APPLICATIONS. 40(9). p.3432-3440
Author
Organization
Keywords
MANAGEMENT, SEQUENCES, SVD, Espionage, Latent semantic indexing, MARKET, TEXT, INFORMATION, CLASSIFICATION, WEST-GERMANY, RISK-ASSESSMENT, LEAKAGE, PROFITS, Risk assessment

Downloads

  • (...).pdf
    • full text
    • |
    • UGent only
    • |
    • PDF
    • |
    • 260.37 KB

Citation

Please use this url to cite or link to this publication:

MLA
Thorleuchter, Dirk, and Dirk Van den Poel. “Protecting Research and Technology from Espionage.” EXPERT SYSTEMS WITH APPLICATIONS, vol. 40, no. 9, 2013, pp. 3432–40, doi:10.1016/j.eswa.2012.12.051.
APA
Thorleuchter, D., & Van den Poel, D. (2013). Protecting research and technology from espionage. EXPERT SYSTEMS WITH APPLICATIONS, 40(9), 3432–3440. https://doi.org/10.1016/j.eswa.2012.12.051
Chicago author-date
Thorleuchter, Dirk, and Dirk Van den Poel. 2013. “Protecting Research and Technology from Espionage.” EXPERT SYSTEMS WITH APPLICATIONS 40 (9): 3432–40. https://doi.org/10.1016/j.eswa.2012.12.051.
Chicago author-date (all authors)
Thorleuchter, Dirk, and Dirk Van den Poel. 2013. “Protecting Research and Technology from Espionage.” EXPERT SYSTEMS WITH APPLICATIONS 40 (9): 3432–3440. doi:10.1016/j.eswa.2012.12.051.
Vancouver
1.
Thorleuchter D, Van den Poel D. Protecting research and technology from espionage. EXPERT SYSTEMS WITH APPLICATIONS. 2013;40(9):3432–40.
IEEE
[1]
D. Thorleuchter and D. Van den Poel, “Protecting research and technology from espionage,” EXPERT SYSTEMS WITH APPLICATIONS, vol. 40, no. 9, pp. 3432–3440, 2013.
@article{3208719,
  author       = {{Thorleuchter, Dirk and Van den Poel, Dirk}},
  issn         = {{0957-4174}},
  journal      = {{EXPERT SYSTEMS WITH APPLICATIONS}},
  keywords     = {{MANAGEMENT,SEQUENCES,SVD,Espionage,Latent semantic indexing,MARKET,TEXT,INFORMATION,CLASSIFICATION,WEST-GERMANY,RISK-ASSESSMENT,LEAKAGE,PROFITS,Risk assessment}},
  language     = {{eng}},
  number       = {{9}},
  pages        = {{3432--3440}},
  title        = {{Protecting research and technology from espionage}},
  url          = {{http://dx.doi.org/10.1016/j.eswa.2012.12.051}},
  volume       = {{40}},
  year         = {{2013}},
}

Altmetric
View in Altmetric
Web of Science
Times cited: