Malicious Attack Propagation and Source Identification

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...

Full description

Bibliographic Details
Main Authors: Jiang, Jiaojiao (Author, http://id.loc.gov/vocabulary/relators/aut), Wen, Sheng (http://id.loc.gov/vocabulary/relators/aut), Liu, Bo (http://id.loc.gov/vocabulary/relators/aut), Yu, Shui (http://id.loc.gov/vocabulary/relators/aut), Xiang, Yang (http://id.loc.gov/vocabulary/relators/aut), Zhou, Wanlei (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Series:Advances in Information Security, 73
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • 1 Introduction
  • 2 Preliminary of Modeling Malicious Attack Propagation
  • 3 User Influence in the Propagation of Malicious Attacks
  • 4 Restrain Malicious Attack Propagation
  • 5 Preliminary of Identifying Propagation Sources
  • 6 Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator
  • 7 Source Identification Under Snapshots: A Sample Path Based Source Estimator
  • 8 Source Identification Under Sensor Observations: A Gaussian Source Estimator
  • 9 Comparative Study and Numerical Analysis
  • 10 Identifying Propagation Source in Time-varying Networks
  • 11 Identifying Multiple Propagation Sources
  • 12 Identifying Propagation Source in Large-scale Networks
  • 13 Future Directions and Conclusion.