Study on the Application of Graph Theory Algorithms and Attack Graphs in Cybersecurity Assessment.
Jinghan ZhangWei WangEnrico ZioPublished in: ICSRS (2023)
Keyphrases
- graph theory
- graph based representations
- social network analysis
- computer vision and pattern recognition
- automata theory
- graph theoretical
- complex networks
- attack graphs
- combinatorial optimization
- maximal cliques
- graph theoretic
- maximum independent set
- graph representations
- neural network
- cost function
- search algorithm
- social networks