Malicious Attack Propagation and Source Identification
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...
| Main Authors: | Jiang, Jiaojiao (Author, http://id.loc.gov/vocabulary/relators/aut), Wen, Sheng (http://id.loc.gov/vocabulary/relators/aut), Liu, Bo (http://id.loc.gov/vocabulary/relators/aut), Yu, Shui (http://id.loc.gov/vocabulary/relators/aut), Xiang, Yang (http://id.loc.gov/vocabulary/relators/aut), Zhou, Wanlei (http://id.loc.gov/vocabulary/relators/aut) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
| Edition: | 1st ed. 2019. |
| Series: | Advances in Information Security,
73 |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Wireless Networking Principles: From Terrestrial to Underwater Acoustic
by: Jiang, Shengming, et al.
Published: (2018) -
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
by: Pang, Zhong-Hua, et al.
Published: (2019) -
Inside Radio: An Attack and Defense Guide
by: Yang, Qing, et al.
Published: (2018) -
Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings /
Published: (2018) -
Mobile Big Data
by: Cheng, Xiang, et al.
Published: (2018)