Internet security applications of the Munn rings

Kelarev, A. V., Yearwood, J. L., Watters, P., Wu, X., Abawajy, J. H. and Pan, L. 2010, Internet security applications of the Munn rings, Semigroup forum, vol. 81, no. 1, pp. 162-171, doi: 10.1007/s00233-010-9242-1.

Attached Files
Name Description MIMEType Size Downloads

Title Internet security applications of the Munn rings
Author(s) Kelarev, A. V.
Yearwood, J. L.
Watters, P.
Wu, X.
Abawajy, J. H.ORCID iD for Abawajy, J. H.
Pan, L.ORCID iD for Pan, L.
Journal name Semigroup forum
Volume number 81
Issue number 1
Start page 162
End page 171
Total pages 10
Publisher Springer New York LLC
Place of publication New York N.Y.
Publication date 2010
ISSN 0037-1912
Keyword(s) Munn rings
Internet security applications
Summary Effective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.
Notes Published online: 19 June 2010
Language eng
DOI 10.1007/s00233-010-9242-1
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
HERDC collection year 2010
Copyright notice ©2010, Springer Science+Business Media
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 8 times in TR Web of Science
Scopus Citation Count Cited 7 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 2076 Abstract Views, 15 File Downloads  -  Detailed Statistics
Created: Wed, 14 Jul 2010, 15:34:10 EST by Jemal Abawajy

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact