2010
DOI: 10.1007/978-1-4419-6045-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Exact and Inexact Graph Matching: Methodology and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(33 citation statements)
references
References 89 publications
0
29
0
Order By: Relevance
“…Particular aspects of graph querying have also been surveyed; for example, works by Bunke [2000], Gallagher [2006], Riesen et al [2010], Livi and Rizzi [2013], and Yan et al [2016] deal with particular aspects of graph pattern matching, while Yu and Cheng [2010] concentrate on graph reachability queries. Again, however, all such works have a narrower focus than our survey.…”
Section: Introductionmentioning
confidence: 99%
“…Particular aspects of graph querying have also been surveyed; for example, works by Bunke [2000], Gallagher [2006], Riesen et al [2010], Livi and Rizzi [2013], and Yan et al [2016] deal with particular aspects of graph pattern matching, while Yu and Cheng [2010] concentrate on graph reachability queries. Again, however, all such works have a narrower focus than our survey.…”
Section: Introductionmentioning
confidence: 99%
“…the error-tolerant subgraph isomorphism with the least expensive sequence of edit operations. In other words, we want to find the minimum amount of distortion needed to transform a Prism into the actual mobile context, thus computing their graph edit distance [21]:…”
Section: Definition 7 (Cost Of Error-tolerant Rdf Subgraph Isomorphism)mentioning
confidence: 99%
“…However, due to NP-completeness of the problem and the computational complexity inherent in such API call graph matching algorithms [10], they are prohibitively expensive to use for large graphs. This study proposes a system to solve the problem of malware detection based on API call graph achieving better detection rate and performance levels.…”
Section: Figure 1 Organization Of Malware Detectionmentioning
confidence: 99%
“…Matching can be classified into two categories, namely, exact matching and inexact matching. Exact graph matching applies when the two graphs has the same number of vertices, whereas in inexact graph matching the two graphs has different number of vertices [10].…”
Section: Introductionmentioning
confidence: 99%