News
In this paper, we present an idea of generating keys for algorithms in Cryptography using the techniques of Graph vertex labeling. The encryption algorithm in scope of this study is Triple DES ...
Security graphs are becoming indispensable for understanding system access and network activity and empowering security teams ...
Graph convolutional neural netwoks (GCNNs) have been emerged to handle graph-structured data in recent years. Most existing GCNNs are either spatial approaches working on neighborhood of each node, or ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results