咨询与建议

限定检索结果

文献类型

  • 46 篇 期刊文献
  • 32 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 79 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 76 篇 工学
    • 73 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 15 篇 电气工程
    • 6 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
  • 5 篇 理学
    • 5 篇 数学
  • 5 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...

主题

  • 79 篇 graph pattern ma...
  • 12 篇 graph simulation
  • 8 篇 subgraph isomorp...
  • 5 篇 graph database
  • 4 篇 incremental patt...
  • 4 篇 pattern matching
  • 4 篇 social networks
  • 4 篇 investigative gr...
  • 3 篇 query processing
  • 3 篇 pattern matching...
  • 3 篇 big graphs
  • 3 篇 graph mining
  • 3 篇 subgraph matchin...
  • 3 篇 social networkin...
  • 3 篇 social network
  • 3 篇 cloud computing
  • 3 篇 graph databases
  • 2 篇 inexact matching
  • 2 篇 performance
  • 2 篇 temporal graph

机构

  • 3 篇 ecole natl super...
  • 3 篇 colorado state u...
  • 3 篇 school of comput...
  • 2 篇 soochow univ sch...
  • 2 篇 chinese acad sci...
  • 2 篇 kyushu int univ ...
  • 2 篇 kyushu univ dept...
  • 2 篇 macquarie univ d...
  • 2 篇 univ chinese aca...
  • 2 篇 unsw nsw
  • 2 篇 univ potsdam has...
  • 2 篇 univ queensland ...
  • 2 篇 univ edinburgh e...
  • 2 篇 univ new south w...
  • 1 篇 ctr rech informa...
  • 1 篇 univ queensland ...
  • 1 篇 zhongguancun lab...
  • 1 篇 univ edinburgh s...
  • 1 篇 univ politecn ca...
  • 1 篇 soochow univ sch...

作者

  • 6 篇 yahiaoui said
  • 6 篇 kheddouci hamama...
  • 5 篇 nouali-taboudjem...
  • 5 篇 liu guanfeng
  • 4 篇 jayasumana anura...
  • 4 篇 hung benjamin w....
  • 4 篇 bouhenni sarra
  • 3 篇 fan wenfei
  • 3 篇 singh komal
  • 3 篇 zhou xiaofang
  • 3 篇 singh vikram
  • 3 篇 bandara vidarsha...
  • 3 篇 barkowsky matthi...
  • 3 篇 zheng kai
  • 3 篇 liu an
  • 3 篇 li zhixu
  • 3 篇 li lei
  • 3 篇 giese holger
  • 2 篇 zhang tianming
  • 2 篇 sun guohao

语言

  • 79 篇 英文
检索条件"主题词=Graph Pattern Matching"
79 条 记 录,以下是61-70 订阅
排序:
IPMES: A Tool for Incremental TTP Detection over the System Audit Event Stream  54
IPMES: A Tool for Incremental TTP Detection over the System ...
收藏 引用
54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
作者: Li, Hong-Wei Liu, Ping-Ting Lin, Bo-Wei Liao, Yi-Chun Huang, Yennun Acad Sinica CITI Taipei Taiwan Natl Yang Ming Chiao Tung Univ Dept Comp Sci Hsinchu Taiwan Natl Taiwan Univ Dept Comp Sci & Informat Engn Taipei Taiwan
Advanced persistent threat (APT) cyberattacks are serious threats to corporations and governments. The prolong dwell time associated with APTs significantly increase the difficulty on detecting them in provenance grap... 详细信息
来源: 评论
Scaling Topology pattern matching: A Distributed Approach  18
Scaling Topology Pattern Matching: A Distributed Approach
收藏 引用
33rd Annual ACM Symposium on Applied Computing (ACM SAC)
作者: Stein, Michael Froemmgen, Alexander Kluge, Roland Wang, Lin Wilberg, Augustin Koldehofe, Boris Muehlhaeuser, Max Tech Univ Darmstadt Darmstadt Germany
graph pattern matching in network topologies is a building block of many distributed algorithms. Based on a limited local view of the topology, pattern-based algorithms substantiate the decision-making of each device ... 详细信息
来源: 评论
Answering graph pattern Query using Incremental Views
Answering Graph Pattern Query using Incremental Views
收藏 引用
IEEE International Conference on Computing, Communication and Automation (ICCCA)
作者: Singh, Komal Singh, Vikram Natl Inst Technol Dept Comp Sci Kurukshetra 136119 Haryana India
In recent years, modeling data in graph structure became evident and effective for processing in some of the prominent application areas like social analytics, health care analytics, scientific analytics etc. The key ... 详细信息
来源: 评论
SISA: Set-Centric Instruction Set Architecture for graph Mining on Processing-in-Memory Systems  21
SISA: Set-Centric Instruction Set Architecture for Graph Min...
收藏 引用
54th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Besta, Maciej Kanakagiri, Raghavendra Kwasniewski, Grzegorz Ausavarungnirun, Rachata Beranek, Jakub Kanellopoulos, Konstantinos Janda, Kacper Vonarburg-Shmaria, Zur Gianinazzi, Lukas Stefan, Ioana Gomez-Luna, Juan Copik, Marcin Kapp-Schwoerer, Lukas Di Girolamo, Salvatore Blach, Nils Konieczny, Marek Mutlu, Onur Hoefler, Torsten Swiss Fed Inst Technol Zurich Switzerland IIT Tirupati Tirupati Andhra Pradesh India King Mongkuts Univ Technol North Bangkok Bangkok Thailand Tech Univ Ostrava Ostrava Czech Republic AGH Univ Sci & Technol Lublin Poland
Simple graph algorithms such as PageRank have been the target of numerous hardware accelerators. Yet, there also exist much more complex graph mining algorithms for problems such as clustering or maximal clique listin... 详细信息
来源: 评论
AutoMine: Harmonizing High-Level Abstraction and High Performance for graph Mining  19
AutoMine: Harmonizing High-Level Abstraction and High Perfor...
收藏 引用
27th ACM Symposium on Operating Systems Principles (SOSP)
作者: Mawhirter, Daniel Wu, Bo Colorado Sch Mines Golden CO 80401 USA
graph mining algorithms that aim at identifying structural patterns of graphs are typically more complex than graph computation algorithms such as breadth first search. Researchers have implemented several systems wit... 详细信息
来源: 评论
Scalable pattern matching over Compressed graphs via Dedensification  16
Scalable Pattern Matching over Compressed Graphs via Dedensi...
收藏 引用
22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)
作者: Maccioni, Antonio Abadi, Daniel J. Roma Tre Univ Rome Italy Yale Univ New Haven CT 06520 USA
One of the most common operations on graph databases is graph pattern matching (e.g., graph isomorphism and more general types of "subgraph pattern matching"). In fact, in some graph query languages every si... 详细信息
来源: 评论
Finding risk patterns in cloud system models  12
Finding risk patterns in cloud system models
收藏 引用
12th IEEE International Conference on Cloud Computing (IEEE CLOUD) held as Part of IEEE World Congress on Services (IEEE SERVICES)
作者: Kunz, Florian Mann, Zoltan Adam Univ Duisburg Essen Paluno Ruhr Inst Software Technol Essen Germany
The risk of unauthorized access to confidential data is a major problem in cloud computing. In previous work, the notion of risk patterns was introduced to capture configurations of cloud systems that are prone to dat... 详细信息
来源: 评论
Towards the Scheduling of Vertex-constrained Multi Subgraph matching Query  20
Towards the Scheduling of Vertex-constrained Multi Subgraph ...
收藏 引用
ACM SIGMOD International Conference on Management of Data (SIGMOD)
作者: Hao, Kongzhang Lai, Longbin UNSW Sydney NSW Australia Alibaba Grp Hangzhou Peoples R China
Subgraph matching is one of the most fundamental problems in graph database, which is associated with a wide spectrum of applications. Researchers have primarily devoted their efforts to improving performance for indi... 详细信息
来源: 评论
Anomaly Subgraph Mining in Large-Scale Social Networks  17
Anomaly Subgraph Mining in Large-Scale Social Networks
收藏 引用
IEEE Int Conf on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA/BDCloud/SocialCom/SustainCom)
作者: Chen, Shengnan Qian, Jianmin Chen, Haopeng Liu, Si Shanghai Jiao Tong Univ Shanghai Peoples R China Boc Financial Technol Co Ltd Shanghai Peoples R China
Anomaly detection is a relevant research field in online social networks (OSNs), which detects the abnormal individuals and activities to protect other regular activities of the whole network. Current detection approa... 详细信息
来源: 评论
POIROT: Aligning Attack Behavior with Kernel Audit Records for Cyber Threat Hunting  19
POIROT: Aligning Attack Behavior with Kernel Audit Records f...
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (CCS)
作者: Milajerdi, Sadegh M. Eshete, Birhanu Gjomemo, Rigel Venkatakrishnan, V. N. Univ Illinois Chicago IL 60680 USA Univ Michigan Ann Arbor MI 48109 USA
Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might have compromised an enterprise network for a long time without being discovered. To have a more effective analysis, CTI open... 详细信息
来源: 评论