Deakin University
Browse

File(s) not publicly available

Identifying multiple propagation sources

Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 10:15
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou
© Springer Nature Switzerland AG 2019. The global diffusion of epidemics, computer viruses and rumors causes great damage to our society. One critical issue to identify the multiple diffusion sources so as to timely quarantine them. However, most methods proposed so far are unsuitable for diffusion with multiple sources because of the high computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce an effective method to identify multiple diffusion sources, which can address three main issues in this area: (1) How many sources are there? (2) Where did the diffusion emerge? (3) When did the diffusion break out? For simplicity, we use rumor source identification to present the approach.

History

Volume

73

Pagination

139-157

ISSN

1568-2633

ISBN-13

978-3-030-02179-5

Publication classification

BN Other book chapter, or book chapter not attributed to Deakin

Publisher

Springer

Place of publication

Cham, Switzerland

Title of book

Malicious Attack Propagation and Source Identification

Series

Advances in Information Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC