ROP Defense Using Trie Graph for System Security.
Alex Yao Chu ZhuWei-Qi YanRoopak SinhaPublished in: Int. J. Digit. Crime Forensics (2021)
Keyphrases
- network security
- intrusion detection
- data structure
- cyber defense
- access control
- information security
- security policies
- graph representation
- defense mechanisms
- graph model
- security issues
- dynamic programming
- graph theory
- graph structure
- security mechanisms
- directed graph
- security measures
- security level
- security analysis
- security requirements
- graph theoretic
- bipartite graph
- weighted graph
- computer networks
- countermeasures
- random walk
- security systems
- cyber security
- computer security
- graph mining
- graph data
- structured data
- information systems
- undirected graph
- security problems
- security threats
- network traffic
- graph matching
- graph partitioning