# graph theory

biblio

- Data mining
- graph theory
- Human behavior
- industrial property
- intellectual property
- knowledgegraphs
- named entity recognition
- natural language processing
- nip
- Plagiarism
- plagiarism detection
- pubcrawl
- relations
- resilience
- Resiliency
- Scalability
- Semantic
- semantic knowledge graphs
- semantic similarity
- Semantics
- Software
- string matching algorithms
- text analysis
- unstructured text

biblio

- search problems
- pubcrawl
- Mathematical model
- standards
- Metrics
- optimisation
- Measurement
- nearest neighbour methods
- graph theory
- query processing
- nearest neighbor search
- Approximation algorithms
- Covariance matrices
- KGE
- knowledge graph embedding
- Nearest Neighbor Searching
- NN search algorithm
- query language
- query languages
- research problems
- SPARQL query processing
- Time factors

biblio

- learning (artificial intelligence)
- search problems
- Training
- pubcrawl
- Data models
- data structures
- Classification algorithms
- neural nets
- Metrics
- Measurement
- nearest neighbour methods
- Acceleration
- graph theory
- classification
- biology
- KNN
- associative data model
- associative data structures
- associative neural network graphs
- associative structures
- computational intelligence
- Knowledge representation
- nearest neighbor search
- Sebestyen measure
- self-organize data
- similarity

biblio

- Data mining
- time series
- pubcrawl
- Indexes
- Metrics
- Measurement
- nearest neighbour methods
- search problems
- Meteorology
- graph theory
- Time series analysis
- query processing
- nearest neighbor search
- Agriculture
- augmented relationship graph model
- Bridges
- horizontal pruning
- query processing strategy
- range interval diversity properties
- sensor data
- similarity search support
- similarity vectors
- Subsequence Mining
- subsequence similarity match problem
- Temperature sensors
- temporal sequence data
- Time Series Data
- time series datasets
- time series nearest neighbor subsequence search
- TINN graph
- TINN model
- TINN nodes

biblio

- pubcrawl
- Indexes
- Metrics
- Measurement
- nearest neighbour methods
- search problems
- Acceleration
- graph theory
- principal component analysis
- Clustering algorithms
- query processing
- approximate nearest neighbor search
- approximation theory
- Binary codes
- Euclidean distance
- file organisation
- GIST1M datasets
- hash-based hill-climbing
- hashing
- hashing-based seed generation
- hill-climbing
- indexing
- Inverted index
- k-nearest neighbor graph
- nearest neighbor graph
- query assignment process
- SIFT1M datasets
- Upper bound
- vector quantization
- nearest neighbor search

biblio

- pubcrawl
- Correlation
- Indexes
- computer science
- Metrics
- Measurement
- nearest neighbour methods
- probability
- graph theory
- query processing
- biology
- distributed system
- DURS
- k-nearest neighbor
- k-nearest neighbor queries
- k-nearest neighbor search
- Market research
- Scalability
- scalable search
- social networking (online)
- uncertain graphs
- nearest neighbor search

biblio

- learning (artificial intelligence)
- security of data
- security
- Anomaly Detection
- Neural networks
- Peer-to-peer computing
- pubcrawl
- policy-based governance
- collaboration
- deep learning
- pattern classification
- neural nets
- Metrics
- deep neural networks
- graph theory
- social networking (online)
- classification
- clustering
- Clustering algorithms
- email network
- Enron dataset
- Graph Neural Network
- graph neural networks
- graph structure
- pattern clustering
- social connection graphs
- social network
- social network statistical measures
- statistical analysis
- Twitter dataset
- Twitter network
- Neural Network Security

biblio

- Computer crime
- computer network security
- IP networks
- Kernel
- computer architecture
- learning (artificial intelligence)
- Resiliency
- pubcrawl
- graph theory
- Neural networks
- convolutional neural nets
- network traffic
- deep learning
- deep neural networks
- Network Security Architecture
- anomaly-based approaches
- deep learning architecture
- flow-based network attack detection
- Graph Kernel
- network attack detection
- network attack detection tasks
- network attack detection technology
- network security practices
- networked system

biblio

- data privacy
- pubcrawl
- graph theory
- privacy
- Routing
- Peer-to-peer computing
- Metrics
- internet
- computer security
- Measurement
- anonymity privacy
- anonymization and de-anonymization
- Autonomous System (AS)level graph
- degree attacks
- edge addition
- fake edges
- fake nodes
- graph data
- graph data necessitates
- graph privacy
- Inter-domain routing
- k- anonymity
- k- automorohism
- k- isomorphism
- naïve ID removal
- node addition
- Privacy-Preserving Mechanism (PPM)
- privacy-preserving mechanisms
- seed-based attack
- strongest attacks
- structural attack
- structure-based attack
- structure-based de-anonymization attacks
- privacy models and measurement

biblio

- security of data
- data privacy
- security
- Current measurement
- Electronic mail
- pubcrawl
- graph theory
- privacy
- Metrics
- social networking (online)
- privacy issues
- Message service
- sensitive information
- Diffusion processes
- graph-theoretical properties
- Messaging services
- over-trusting vulnerable users
- privacy awareness framework
- privacy fields
- social privacy score
- vulnerability contagion process
- vulnerability diffusion process
- vulnerability measurement
- vulnerable friends
- vulnerable interactions
- vulnerable social interactions
- privacy models and measurement