Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Crossref DOI link: https://doi.org/10.3103/S0146411619080327
Published Online: 2020-03-04
Published Print: 2019-12
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Zaitseva, E. A.
Zegzhda, D. P.
Poltavtseva, M. A.
Text and Data Mining valid from 2019-12-01
Version of Record valid from 2019-12-01
Article History
Received: 18 March 2019
Revised: 25 March 2019
Accepted: 19 April 2019
First Online: 4 March 2020
CONFLICT OF INTEREST
: The authors declare that they have no conflicts of interest.