News

In this paper, we present an idea of generating keys for algorithms in Cryptography using the techniques of Graph vertex labeling. The encryption algorithm in scope of this study is Triple DES ...
Security graphs are becoming indispensable for understanding system access and network activity and empowering security teams ...
Graph convolutional neural netwoks (GCNNs) have been emerged to handle graph-structured data in recent years. Most existing GCNNs are either spatial approaches working on neighborhood of each node, or ...