Malicious Attack Propagation and Source Identification
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...
Κύριοι συγγραφείς: | Jiang, Jiaojiao (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Wen, Sheng (http://id.loc.gov/vocabulary/relators/aut), Liu, Bo (http://id.loc.gov/vocabulary/relators/aut), Yu, Shui (http://id.loc.gov/vocabulary/relators/aut), Xiang, Yang (http://id.loc.gov/vocabulary/relators/aut), Zhou, Wanlei (http://id.loc.gov/vocabulary/relators/aut) |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | SpringerLink (Online service) |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
Έκδοση: | 1st ed. 2019. |
Σειρά: | Advances in Information Security,
73 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Παρόμοια τεκμήρια
-
Wireless Networking Principles: From Terrestrial to Underwater Acoustic
ανά: Jiang, Shengming, κ.ά.
Έκδοση: (2018) -
Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
ανά: Pang, Zhong-Hua, κ.ά.
Έκδοση: (2019) -
Inside Radio: An Attack and Defense Guide
ανά: Yang, Qing, κ.ά.
Έκδοση: (2018) -
Research in Attacks, Intrusions, and Defenses 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings /
Έκδοση: (2018) -
Mobile Big Data
ανά: Cheng, Xiang, κ.ά.
Έκδοση: (2018)