[1]
“A Study of Graph Theory Applications in IT Security”,
Iraqi Journal of Science
, vol. 61, no. 10, pp. 2705–2714, Oct. 2020,
doi: 10.24996/ijs.2020.61.10.28.