Security in Sierpiński graphs.
Manju K. MenonM. R. ChithraK. S. SavithaPublished in: Discret. Appl. Math. (2023)
Keyphrases
- intrusion detection
- security requirements
- access control
- graph theoretic
- information assurance
- subgraph isomorphism
- security issues
- network security
- information security
- graph theory
- graph structure
- graph mining
- graph partitioning
- sensitive data
- security management
- security protocols
- database
- security problems
- neural network
- security level
- security systems
- data security
- cyber security
- computer security
- key management
- functional requirements
- information systems