Malicious Attack Propagation and Source Identification

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Jiang, Jiaojiao (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Wen, Sheng (http://id.loc.gov/vocabulary/relators/aut), Liu, Bo (http://id.loc.gov/vocabulary/relators/aut), Yu, Shui (http://id.loc.gov/vocabulary/relators/aut), Xiang, Yang (http://id.loc.gov/vocabulary/relators/aut), Zhou, Wanlei (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Advances in Information Security, 73
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • 1 Introduction
  • 2 Preliminary of Modeling Malicious Attack Propagation
  • 3 User Influence in the Propagation of Malicious Attacks
  • 4 Restrain Malicious Attack Propagation
  • 5 Preliminary of Identifying Propagation Sources
  • 6 Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator
  • 7 Source Identification Under Snapshots: A Sample Path Based Source Estimator
  • 8 Source Identification Under Sensor Observations: A Gaussian Source Estimator
  • 9 Comparative Study and Numerical Analysis
  • 10 Identifying Propagation Source in Time-varying Networks
  • 11 Identifying Multiple Propagation Sources
  • 12 Identifying Propagation Source in Large-scale Networks
  • 13 Future Directions and Conclusion.