File(s) under permanent embargo
Comparative study and numerical analysis
Version 2 2024-06-03, 11:49Version 2 2024-06-03, 11:49
Version 1 2019-04-15, 14:05Version 1 2019-04-15, 14:05
chapter
posted on 2024-06-03, 11:49 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou© Springer Nature Switzerland AG 2019. This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.
History
Volume
73Chapter number
8Pagination
95-114Publisher DOI
ISSN
1568-2633ISBN-13
9783030021795Language
engPublication classification
BN Other book chapter, or book chapter not attributed to DeakinCopyright notice
2019, Springer Nature Switzerland AGExtent
13Editor/Contributor(s)
Jiang J, Wen S, Liu B, Yu S, Xiang Y, Zhou WPublisher
SpringerPlace of publication
Cham, SwitzerlandTitle of book
Malicious attack propagation and source identificationSeries
Advances in information securityUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC