Research Article

Using Graph Representation in Host-Based Intrusion Detection

Figure 4

Example of random state walk (walk_length = 5).