[1]
“A Study of Graph Theory Applications in IT Security”, Iraqi Journal of Science, vol. 61, no. 10, pp. 2705–2714, Oct. 2020, doi: 10.24996/ijs.2020.61.10.28.