Future directions and conclusion
Version 2 2024-06-18, 13:19Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 10:15Version 1 2019-06-27, 10:15
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou© Springer Nature Switzerland AG 2019. While previous chapters provide a thorough description on malicious attack propagation and source identification, many interesting and promising issues remain unexplored. The development of online social networks provides great opportunities for research on restraining malicious attacks and identifying attack sources, but also presents a challenge in effective utilization of the large volume of data. There are still other topics that need to be considered in malicious attack propagation and source identification, and we consider a few directions that are worthy of future attention.
History
Volume
73Pagination
179-181Publisher DOI
ISSN
1568-2633ISBN-13
978-3-030-02179-5Publication classification
BN Other book chapter, or book chapter not attributed to DeakinPublisher
SpringerPlace of publication
Cham, SwitzerlandTitle of book
Malicious Attack Propagation and Source IdentificationSeries
Advances in Information SecurityUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC