Login / Signup
On the Application of Algebraic Graph Theory to Modeling Network Intrusions.
Chuck Easttom
Published in:
CCWC (2020)
Keyphrases
</>
graph theory
graph theoretical
graph theoretic
computer vision and pattern recognition
pattern recognition
social network analysis
automata theory
graph based representations
databases
cost function
anomaly detection
network intrusions