Research Article
Using Graph Representation in Host-Based Intrusion Detection
| Require: full graph , system call sequence , node index map | | Ensure: subgraph , adjacency | (1) | | (2) | | (3) | Create a zero matrix | (4) | for to do: | (5) | if and then | (6) | | (7) | end if | (8) | end for | (9) | | (10) | | (11) | |
|