1.
A Study of Graph Theory Applications in IT Security. Iraqi Journal of Science [Internet]. 2020 Oct. 28 [cited 2024 Dec. 20];61(10):2705-14. Available from: https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/1686