Login / Signup
Modeling Attackers Based on Heterogenous Graph through Malicious HTTP Requests.
Shengqin Ao
Yitong He
Ning Luo
Xuren Wang
Zhengwei Jiang
Jun Jiang
Published in:
CSCWD (2021)
Keyphrases
</>
malicious attacks
open source
graph representation
stable set
website
directed graph
graph matching
weighted graph
information systems
random walk
connected components
graph theory
graph structure
spanning tree
modeling method
graph search