Deakin University
Browse

File(s) under permanent embargo

Comparative study and numerical analysis

Version 2 2024-06-03, 11:49
Version 1 2019-04-15, 14:05
chapter
posted on 2024-06-03, 11:49 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou
© Springer Nature Switzerland AG 2019. This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.

History

Volume

73

Chapter number

8

Pagination

95-114

ISSN

1568-2633

ISBN-13

9783030021795

Language

eng

Publication classification

BN Other book chapter, or book chapter not attributed to Deakin

Copyright notice

2019, Springer Nature Switzerland AG

Extent

13

Editor/Contributor(s)

Jiang J, Wen S, Liu B, Yu S, Xiang Y, Zhou W

Publisher

Springer

Place of publication

Cham, Switzerland

Title of book

Malicious attack propagation and source identification

Series

Advances in information security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC