Research Article
Using Graph Representation in Host-Based Intrusion Detection
| Require: sub graph , node index map , adjacency | | Ensure: vector | (1) | Initialization: create zero vector which has elements; | (2) | | (3) | while true do | (4) | | (5) | fordo: | (6) | | (7) | | (8) | update | (9) | | (10) | end for | (11) | ifthen | (12) | break; | (13) | end if | (14) | end while | (15) | |
|