Network Vulnerability Analysis Using a Constrained Graph Data Model.
Mridul Sankar BarikChandan MazumdarAmarnath GuptaPublished in: ICISS (2016)
Keyphrases
- data model
- network model
- fully connected
- spanning tree
- graph model
- dynamic networks
- communication networks
- path length
- graph structure
- database systems
- query language
- network structure
- structured data
- peer to peer
- object model
- random graphs
- graph representation
- object oriented
- directed acyclic graph
- random walk
- connected components
- computer networks
- directed graph
- citation networks
- highly connected
- database
- link prediction
- graph matching
- network traffic