Applied graph theory to security: A qualitative placement of security solutions within IoT networks.
Tanguy GodquinMorgan BarbierChrystel GaberJean-Luc GrimaultJean-Marie Le BarsPublished in: J. Inf. Secur. Appl. (2020)
Keyphrases
- graph theory
- information security
- security problems
- intrusion detection
- security issues
- access control
- security requirements
- complex networks
- computer networks
- graph theoretical
- graph theoretic
- optimal solution
- key management
- security policies
- network analysis
- community mining
- network model
- neural network
- learning theory
- social networks