-security bondage numbers in graphs.
Hamideh AramMaryam AtapourSeyed Mahmoud SheikholeslamiPublished in: Discuss. Math. Graph Theory (2018)
Keyphrases
- information security
- security requirements
- network security
- access control
- intrusion detection
- information assurance
- data security
- statistical databases
- graph mining
- graph theory
- graph matching
- security systems
- graph theoretic
- security mechanisms
- security management
- graph databases
- directed graph
- security level
- information systems
- security vulnerabilities
- graph construction
- graph representation
- security protocols
- functional requirements
- sensitive data
- security issues
- neural network
- security policies
- graph structure
- data mining