Research Article

Using Graph Representation in Host-Based Intrusion Detection

Algorithm 6

WeightedGraphPooling .
Require: sub graph , node index map , adjacency
Ensure: vector
(1)Initialization: create zero vector which has elements;
(2)
(3)while true do
(4)  
(5)  fordo:
(6)    
(7)    
(8)    update
(9)    
(10)  end for
(11)  ifthen
(12)    break;
(13)  end if
(14)end while
(15)