2025
DOI: 10.1002/spy2.473
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Node Degree Centrality Computing of Network Security Database Based on Knowledge Graph

Chao Wu,
Feng Wu

Abstract: With the development and popularization of network technology, network security issues are increasingly being valued. The application of knowledge graph technology in network security can significantly enhance the level of protection, assist users and relevant departments in understanding overall trends of network security vulnerabilities, and swiftly identify and respond to security threats. To improve the analysis and response capabilities to network security threats, developing methods for identifying key n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 38 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?