The creation of network intrusion fingerprints by graph homomorphism

William Easttom, Mo Adda

Research output: Contribution to journalArticlepeer-review

173 Downloads (Pure)

Fingerprint

Dive into the research topics of 'The creation of network intrusion fingerprints by graph homomorphism'. Together they form a unique fingerprint.

Computer Science

INIS