Security in graphs.
Robert C. BrighamRonald D. DuttonStephen T. HedetniemiPublished in: Discret. Appl. Math. (2007)
Keyphrases
- information security
- security issues
- security requirements
- network security
- directed graph
- access control
- security policies
- graph theory
- computer security
- intrusion detection
- security analysis
- security problems
- security management
- security model
- series parallel
- graph clustering
- information assurance
- functional requirements
- graph theoretic
- countermeasures
- weighted graph
- human operators
- graph representation
- graph kernels
- statistical databases
- security systems
- graph mining
- graph structure
- security measures
- graph matching