Results 131 to 140 of about 102,063 (249)

Homology analysis of malware based on graph

open access: yesTongxin xuebao, 2017
Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph ...
Bing-lin ZHAO   +4 more
doaj   +2 more sources

Node Embedding and Cosine Similarity for Efficient Maximum Common Subgraph Discovery

open access: yesApplied Sciences
Finding the maximum common induced subgraph is a fundamental problem in computer science. Proven to be NP-hard in the 1970s, it has, nowadays, countless applications that still motivate the search for efficient algorithms and practical heuristics.
Stefano Quer   +4 more
doaj   +1 more source

Random Generation Topology Coding Technique in Asymmetric Topology Encryption

open access: yesMathematics
The security of traditional public key cryptography algorithms depends on the difficulty of the underlying mathematical problems. Asymmetric topological encryption is a graph-dependent encryption algorithm produced to resist attacks by quantum computers ...
Jing Su, Bing Yao
doaj   +1 more source

Searching for Similar Subgraphs in an Unweighted Undirected Graph by Computing Isomorphic Path Sets

open access: yesСовременные информационные технологии и IT-образование
The topic of subgraph search in a supergraph remains relevant and fundamental. Graphs are highly successful models for both visualization and handling complex relationships, such as those represented in semantic networks or even source code of programs ...
Valentin Sysoev, Aleksandr Bykov
doaj   +1 more source

Multi-Task Prediction Method Based on GGCN for Object Centric Event Logs

open access: yesIEEE Access
Event logs constitute the fundamental data for predictive process monitoring research, and the quality and format of these logs are crucial for predictive analysis.
Li Ke, Fang Huan, Xu Yifei, Shao Chifeng
doaj   +1 more source

Home - About - Disclaimer - Privacy