Malicious Attack Propagation and Source Identification
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...
Κύριοι συγγραφείς: | , , , , , |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
Έκδοση: | 1st ed. 2019. |
Σειρά: | Advances in Information Security,
73 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- 1 Introduction
- 2 Preliminary of Modeling Malicious Attack Propagation
- 3 User Influence in the Propagation of Malicious Attacks
- 4 Restrain Malicious Attack Propagation
- 5 Preliminary of Identifying Propagation Sources
- 6 Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator
- 7 Source Identification Under Snapshots: A Sample Path Based Source Estimator
- 8 Source Identification Under Sensor Observations: A Gaussian Source Estimator
- 9 Comparative Study and Numerical Analysis
- 10 Identifying Propagation Source in Time-varying Networks
- 11 Identifying Multiple Propagation Sources
- 12 Identifying Propagation Source in Large-scale Networks
- 13 Future Directions and Conclusion.