Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems.
Elizaveta ZaitsevaDmitry P. ZegzhdaMaria A. PoltavtsevaPublished in: Autom. Control. Comput. Sci. (2019)
Keyphrases
- computer systems
- graph representation
- computer security
- information processing systems
- operating system
- data processing
- communication systems
- computer networks
- computing systems
- intrusion detection
- computer technology
- database systems
- text mining
- access control
- keywords
- databases
- graph model
- human beings
- computer architecture
- information systems
- information retrieval