Poster: Towards Complete Computation Graph Generation for Security Assessment of ROS Applications.
Yunpeng LuoZiwen WanQi Alfred ChenPublished in: CCS (2022)
Keyphrases
- graph representation
- information security
- graph structure
- risk assessment
- intrusion detection
- weighted graph
- structured data
- computer security
- security mechanisms
- security requirements
- graph matching
- security systems
- graph model
- subgraph isomorphism
- security threats
- access control
- graph theoretic
- security issues
- statistical databases
- graph theory
- directed graph
- random walk
- graph partitioning
- efficient computation
- graph databases
- directed acyclic graph
- functional requirements
- bipartite graph
- random graphs
- operating system
- security problems
- database
- security measures