File(s) under permanent embargo
Comparative study and numerical analysis
chapter
posted on 2019-01-01, 00:00 authored by J Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou© Springer Nature Switzerland AG 2019. This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.