ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph.
Yan ZhengWeiyu DongJiangtao ZhaoPublished in: CSP (2021)
Keyphrases
- information security
- detection method
- detection accuracy
- access control
- automatic detection
- graph theory
- graph representation
- graph structure
- graph matching
- malware detection
- security systems
- security requirements
- graph theoretic
- graph databases
- security policies
- bipartite graph
- database
- false positives
- detection algorithm
- intrusion detection
- knowledge representation
- weighted graph
- graph mining
- directed graph
- random walk
- object detection
- pairwise