Login / Signup

On the diameter vulnerability of Kautz digraphs.

Ding-Zhu DuD. Frank HsuYuh-Dauh Lyuu
Published in: Discret. Math. (1996)
Keyphrases
  • equivalence classes
  • directed graph
  • risk assessment
  • knowledge compilation
  • attack graphs
  • real world
  • information retrieval
  • case study
  • three dimensional
  • access control
  • security vulnerabilities
  • buffer overflow