Latest version: v1.0.6
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Graph library implementation using generalization of B.G.Nickel et al. algorithm for identifying graphs.
No known vulnerabilities found