{"_id":"QSyxfd5TRbGcSwryM","bibbaseid":"kanawati-leveragingcomplexnetworkanalysisforexplainablenetworkintrusiondetection","author_short":["Kanawati, R."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Rushed"],"propositions":[],"lastnames":["Kanawati"],"suffixes":[]}],"title":"Leveraging Complex Network Analysis for ExplainableNetwork Intrusion Detection","bibtex":"@Article{,\n author = {Rushed Kanawati},\n title = {Leveraging Complex Network Analysis for ExplainableNetwork Intrusion Detection},\n}\n\n","author_short":["Kanawati, R."],"key":"","id":"","bibbaseid":"kanawati-leveragingcomplexnetworkanalysisforexplainablenetworkintrusiondetection","role":"author","urls":{},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://lipn.fr/~kanawati/rk-invtalk.bib","dataSources":["Le9TDqupodtpMKKd4"],"keywords":[],"search_terms":["leveraging","complex","network","analysis","explainablenetwork","intrusion","detection","kanawati"],"title":"Leveraging Complex Network Analysis for ExplainableNetwork Intrusion Detection","year":null}