DocumentCode :
3584662
Title :
Graph Theory and Cyber Security
Author :
Dawood, Harith A.
Author_Institution :
Comput. Sci. Dept., Cihan Univ., Erbil, Iraq
fYear :
2014
Firstpage :
90
Lastpage :
96
Abstract :
One of the most important fields in discrete mathematics is graph theory. Graph theory is discrete structures, consisting of vertices and edges that connect these vertices. Problems in almost every conceivable discipline can be solved using graph models. The field graph theory started its journey from the problem of Konigsberg Bridges in 1735. This paper is a guide for the applied mathematician who would like to know more about network security, cryptography and cyber security based of graph theory. The paper gives a brief overview of the subject and the applications of graph theory in computer security, and provides pointers to key research and recent survey papers in the area.
Keywords :
graph theory; security of data; computer security; cryptography; cyber security; discrete mathematics; graph edge; graph theory; graph vertices; network security; Computational modeling; Computer networks; Computer security; Computers; Graph theory; Object oriented modeling; attack tree; cyber security; data security; graph theory; network security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advanced Computer Science Applications and Technologies (ACSAT), 2014 3rd International Conference on
Type :
conf
DOI :
10.1109/ACSAT.2014.23
Filename :
7076875
Link To Document :
بازگشت