1. Active graph reachability reduction for network security and software engineering;Zheng,2011
2. Heat-ray: combating identity snowball attacks using machine learning, combinatorial optimization and attack graphs;Dunagan,2009
3. Removing undesirable flows by edge deletion;Polevoy,2018
4. The computation of optimal subset repairs;Miao;Proc. VLDB Endow.,2020
5. Vertex cover in conflict graphs;Miao;Theor. Comput. Sci.,2019