Research Article
Using Graph Representation in Host-Based Intrusion Detection
| Require: graph , start node , walk length , node index map , node transition probability matrix | | Ensure: walk path from node | (1) | | (2) | | (3) | whiledo: | (4) | | (5) | | (6) | ifthen | (7) | | (8) | else | (9) | | (10) | end if | (11) | end while |
|