Malicious Attack Propagation and Source Identification

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...

Full description

Bibliographic Details
Main Authors: Jiang, Jiaojiao (Author, http://id.loc.gov/vocabulary/relators/aut), Wen, Sheng (http://id.loc.gov/vocabulary/relators/aut), Liu, Bo (http://id.loc.gov/vocabulary/relators/aut), Yu, Shui (http://id.loc.gov/vocabulary/relators/aut), Xiang, Yang (http://id.loc.gov/vocabulary/relators/aut), Zhou, Wanlei (http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Series:Advances in Information Security, 73
Subjects:
Online Access:Full Text via HEAL-Link

Internet

Full Text via HEAL-Link

ΒΚΠ - Πατρα: ALFd

Holdings details from ΒΚΠ - Πατρα: ALFd
Call Number: 330.01 BAU
Copy 1 Available

ΒΚΠ - Πατρα: BSC

Holdings details from ΒΚΠ - Πατρα: BSC
Call Number: 330.01 BAU
Copy 2 Available
Copy 3 Available