Login / Signup

A graph-theoretical model of computer security.

Mark BurgessGeoffrey CanrightKenth Engø-Monsen
Published in: Int. J. Inf. Sec. (2004)
Keyphrases
  • computer security
  • graph theoretical
  • computational model
  • reinforcement learning
  • objective function
  • evolutionary algorithm
  • probabilistic model
  • text mining
  • graph theory