Research Article

Using Graph Representation in Host-Based Intrusion Detection

Figure 1

Schematic diagram of GRID.