[1]
R. Goonatilake and S. Herath, “Topological Analysis of Network Systems for Intrusion Detections”,
DAFS
, vol. 4, no. 2, p. 28, May 2016.