Cite
Computational approaches to suspicion in adversarial settings
MLA
David B. Skillicorn. “Computational Approaches to Suspicion in Adversarial Settings.” Information Systems Frontiers, vol. 13, Oct. 2010, pp. 21–31. EBSCOhost, https://doi.org/10.1007/s10796-010-9279-4.
APA
David B. Skillicorn. (2010). Computational approaches to suspicion in adversarial settings. Information Systems Frontiers, 13, 21–31. https://doi.org/10.1007/s10796-010-9279-4
Chicago
David B. Skillicorn. 2010. “Computational Approaches to Suspicion in Adversarial Settings.” Information Systems Frontiers 13 (October): 21–31. doi:10.1007/s10796-010-9279-4.