Identifying multiple propagation sources
Version 2 2024-06-18, 13:19Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 10:15Version 1 2019-06-27, 10:15
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou© Springer Nature Switzerland AG 2019. The global diffusion of epidemics, computer viruses and rumors causes great damage to our society. One critical issue to identify the multiple diffusion sources so as to timely quarantine them. However, most methods proposed so far are unsuitable for diffusion with multiple sources because of the high computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce an effective method to identify multiple diffusion sources, which can address three main issues in this area: (1) How many sources are there? (2) Where did the diffusion emerge? (3) When did the diffusion break out? For simplicity, we use rumor source identification to present the approach.
History
Volume
73Pagination
139-157ISSN
1568-2633ISBN-13
978-3-030-02179-5Publication classification
BN Other book chapter, or book chapter not attributed to DeakinPublisher
SpringerPlace of publication
Cham, SwitzerlandTitle of book
Malicious Attack Propagation and Source IdentificationSeries
Advances in Information SecurityUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC