Deakin University
Browse

File(s) not publicly available

Malicious attack propagation and source identification

Version 2 2024-06-04, 11:36
Version 1 2019-05-20, 09:40
book
posted on 2024-06-04, 11:36 authored by J Jiang, S Wen, B Liu, S Yu, Y Xiang, W Zhou
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book.

History

Volume

73

Pagination

1-192

ISSN

1568-2633

ISBN-13

978-3-030-02179-5

Language

eng

Publication classification

A1.1 Books - authored - research

Number of chapters

13

Publisher

Springer

Place of publication

Berlin, Germany

Series

Advances in Information Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC