Author:
Barik Mridul Sankar,Mazumdar Chandan,Gupta Amarnath
Publisher
Springer International Publishing
Reference30 articles.
1. Asterixdb. https://asterixdb.ics.uci.edu/ . Accessed 30 July 2016
2. Cypher query language. https://neo4j.com/developer/cypher-query-language/ . Accessed 30 July 2016
3. Neo4j graph database. https://neo4j.com/ . Accessed 30 July 2016
4. Property graph model. https://github.com/tinkerpop/blueprints/wiki/Property-Graph-Model . Accessed 30 July 2016
5. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, New York, pp. 217–224. ACM (2002)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Novel Network Security Situation Awareness Model for Advanced Persistent Threat;2022 7th IEEE International Conference on Data Science in Cyberspace (DSC);2022-07
2. FLASc: a formal algebra for labeled property graph schema;Automated Software Engineering;2022-04-02
3. Extending the Integrity Constraint Support in a Graph Database;IEEE Latin America Transactions;2021-04
4. Wireless Cyber-Physical System Performance Evaluation Through a Graph Database Approach;Journal of Computing and Information Science in Engineering;2020-10-16
5. An Attack Path Generation Methods Based on Graph Database;2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC);2020-06