[1]
T. A. Khaleel and A. A. Al-Shumam, “A Study of Graph Theory Applications in IT Security”, eijs, vol. 61, no. 10, pp. 2705-2714, Oct. 2020.