1. Automatic graph pruning based on kernel alignment for spectral clustering;Alvarez-Meza;Pattern Recognit. Lett.,2016
2. Extending the creation operation in the schematic protection model;Ammann,1990
3. Extending attack graph-based metrics for enterprise network security management;Bopche,2016
4. Towards a theory of insider threat assessment;Chinchani,2005
5. Privilege Graph: an extension to the typed access matrix model;Dacier,1994