[1]
R. Goonatilake and S. Herath, “Topological Analysis of Network Systems for Intrusion Detections”, DAFS, vol. 4, no. 2, p. 28, May 2016.