Using Graph Theory for Improving Machine Learning-based Detection of Cyber Attacks.
Giacomo ZonneveldLorenzo PrincipiMarco BaldiPublished in: CoRR (2024)
Keyphrases
- graph theory
- machine learning
- cyber attacks
- attack detection
- social network analysis
- graph theoretical
- countermeasures
- cyber security
- social networks
- complex networks
- computational intelligence
- graph based representations
- pattern recognition
- data mining
- information systems
- genetic algorithm
- cloud computing
- intrusion detection
- network management