Restrain malicious attack propagation

Jiang, Jiaojiao, Wen, Sheng, Yu, Shui, Liu, Bo, Xiang, Yang and Zhou, Wanlei 2019, Restrain malicious attack propagationMalicious Attack Propagation and Source Identification, Springer, Cham, Switzerland, pp.41-62, doi: 10.1007/978-3-030-02179-5_4.

Title Restrain malicious attack propagation
Author(s) Jiang, Jiaojiao
Wen, Sheng
Yu, ShuiORCID iD for Yu, Shui
Liu, BoORCID iD for Liu, Bo
Xiang, YangORCID iD for Xiang, Yang
Zhou, WanleiORCID iD for Zhou, Wanlei
Title of book Malicious Attack Propagation and Source Identification
Publication date 2019
Series Advances in Information Security
Start page 41
End page 62
Total pages 22
Publisher Springer
Place of Publication Cham, Switzerland
ISBN 978-3-030-02179-5
ISSN 1568-2633
DOI 10.1007/978-3-030-02179-5_4
Indigenous content off
HERDC Research category BN Other book chapter, or book chapter not attributed to Deakin
Persistent URL

Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 33 Abstract Views  -  Detailed Statistics
Created: Thu, 27 Jun 2019, 10:15:39 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact