Login / Signup
A graph-theoretical model of computer security.
Mark Burgess
Geoffrey Canright
Kenth Engø-Monsen
Published in:
Int. J. Inf. Sec. (2004)
Keyphrases
</>
computer security
graph theoretical
computational model
reinforcement learning
objective function
evolutionary algorithm
probabilistic model
text mining
graph theory