Login / Signup
Graph-theoretic characterization of cyber-threat infrastructures.
Amine Boukhtouta
Djedjiga Mouheb
Mourad Debbabi
Omar Alfandi
Farkhund Iqbal
May El Barachi
Published in:
Digit. Investig. (2015)
Keyphrases
</>
graph theoretic
cyber crime
graph theory
hamiltonian path
bayesian network structure learning
random graphs
maximum independent set
graph properties
binary relations
data management
maximal cliques
identity theft