File(s) under permanent embargo

Comparative study and numerical analysis

chapter
posted on 2019-01-01, 00:00 authored by J Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
© Springer Nature Switzerland AG 2019. This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.

History

Title of book

Malicious attack propagation and source identification

Volume

73

Series

Advances in information security

Chapter number

8

Pagination

95 - 114

Publisher

Springer

Place of publication

Cham, Switzerland

ISSN

1568-2633

ISBN-13

9783030021795

Language

eng

Publication classification

BN Other book chapter, or book chapter not attributed to Deakin

Copyright notice

2019, Springer Nature Switzerland AG

Extent

13

Editor/Contributor(s)

Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou

Usage metrics

Read the peer-reviewed publication

Categories

Keywords

Exports