Deakin University
Browse

File(s) not publicly available

Identifying propagation source in time-varying networks

Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 10:15
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou
© Springer Nature Switzerland AG 2019. Identifying the propagation sources of malicious attacks in complex networks plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of the underlying networks and the ongoing dynamic processes challenge our traditional source identification techniques which are considered in static networks. In this chapter, we introduce an effective approach used in criminology to overcome the challenges. For simplicity, we use rumor source identification to present the approach.

History

Volume

73

Pagination

117-137

ISSN

1568-2633

ISBN-13

978-3-030-02179-5

Publication classification

BN Other book chapter, or book chapter not attributed to Deakin

Publisher

Springer

Place of publication

Cham, Switzerland

Title of book

Malicious Attack Propagation and Source Identification

Series

Advances in Information Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC