Using Graph Theory for Cloud System Security Modeling.
Peter D. ZegzhdaDmitry P. ZegzhdaAlexey V. NikolskiyPublished in: MMM-ACNS (2012)
Keyphrases
- graph theory
- graph theoretical
- computer vision and pattern recognition
- complex networks
- graph based representations
- social network analysis
- minimum spanning tree
- graph theoretic
- automata theory
- combinatorial optimization
- information security
- maximal cliques
- network security
- protein structure prediction
- access control
- neural network
- constraint satisfaction problems
- document similarity
- community mining
- intrusion detection
- maximum independent set