The creation of network intrusion fingerprints by graph homomorphism

William Easttom, Mo Adda

Research output: Contribution to journalArticlepeer-review

176 Downloads (Pure)

Fingerprint

Dive into the research topics of 'The creation of network intrusion fingerprints by graph homomorphism'. Together they form a unique fingerprint.

INIS

Computer Science

Mathematics