Related to the field of cyber security I'm looking at graph database modeling and graph algorithms.
I have Requests nodes that typical will contain data related to a HTTP request, in example HTTP Header and HTTP URL information. It is possible to use...