Return to Article Details Resilient Graph Identification Models Based on Identifying Secure Domination Download Download PDF