Malicious Attack Propagation and Source Identification
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...
| Main Authors: | , , , , , |
|---|---|
| Corporate Author: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2019.
|
| Edition: | 1st ed. 2019. |
| Series: | Advances in Information Security,
73 |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- 1 Introduction
- 2 Preliminary of Modeling Malicious Attack Propagation
- 3 User Influence in the Propagation of Malicious Attacks
- 4 Restrain Malicious Attack Propagation
- 5 Preliminary of Identifying Propagation Sources
- 6 Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator
- 7 Source Identification Under Snapshots: A Sample Path Based Source Estimator
- 8 Source Identification Under Sensor Observations: A Gaussian Source Estimator
- 9 Comparative Study and Numerical Analysis
- 10 Identifying Propagation Source in Time-varying Networks
- 11 Identifying Multiple Propagation Sources
- 12 Identifying Propagation Source in Large-scale Networks
- 13 Future Directions and Conclusion.