Graph Similarity and its Applications to Hardware Security.
Marc FyrbiakSebastian WallatSascha ReinhardNicolai BissantzChristof PaarPublished in: IEEE Trans. Computers (2020)
Keyphrases
- similarity measure
- low cost
- similarity graph
- similarity scores
- random number generator
- structured data
- hardware and software
- similarity metric
- graph representation
- normalized cut
- graph structure
- graph theory
- computer security
- real time
- embedded systems
- similarity matrix
- intrusion detection
- graph theoretic
- similarity measurement
- access control
- security requirements
- inexact graph matching
- spanning tree
- directed acyclic graph
- undirected graph
- statistical databases
- graph partitioning
- security issues
- graph databases
- security policies
- graph model
- network security
- graph matching
- information security
- directed graph
- random walk
- computer systems