Malicious Attack Propagation and Source Identification by Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi...

Full description

Saved in:
Bibliographic Details
Main Authors: Jiang, Jiaojiao (Author), Wen, Sheng (Author), Liu, Bo (Author), Yu, Shui (Author), Xiang, Yang (Author), Zhou, Wanlei (Author)
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Series:Advances in Information Security, 73
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.
Table of Contents:
  • 1 Introduction
  • 2 Preliminary of Modeling Malicious Attack Propagation
  • 3 User Influence in the Propagation of Malicious Attacks
  • 4 Restrain Malicious Attack Propagation
  • 5 Preliminary of Identifying Propagation Sources
  • 6 Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator
  • 7 Source Identification Under Snapshots: A Sample Path Based Source Estimator
  • 8 Source Identification Under Sensor Observations: A Gaussian Source Estimator
  • 9 Comparative Study and Numerical Analysis
  • 10 Identifying Propagation Source in Time-varying Networks
  • 11 Identifying Multiple Propagation Sources
  • 12 Identifying Propagation Source in Large-scale Networks
  • 13 Future Directions and Conclusion.