Research Article

Using Graph Representation in Host-Based Intrusion Detection

Figure 2

Example: transform system calls to graph.