Graph Theory Applications in Network Security.
Jonathan WebbFernando DocemmilliMikhail BoninPublished in: CoRR (2015)
Keyphrases
- network security
- graph theory
- computer networks
- intrusion detection
- graph theoretical
- traffic analysis
- intrusion detection system
- security breaches
- social network analysis
- network traffic
- automata theory
- complex networks
- security policies
- graph theoretic
- dos attacks
- risk assessment
- information security
- anomaly detection
- maximal cliques
- graph properties
- graph based representations
- security protection
- network administrators
- maximum independent set
- anti phishing
- network monitoring
- packet filtering
- network attacks
- situation assessment
- graph representations
- information systems
- particle swarm optimization