File(s) not publicly available
Identifying propagation source in time-varying networks
Version 2 2024-06-18, 13:19Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 10:15Version 1 2019-06-27, 10:15
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou© Springer Nature Switzerland AG 2019. Identifying the propagation sources of malicious attacks in complex networks plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of the underlying networks and the ongoing dynamic processes challenge our traditional source identification techniques which are considered in static networks. In this chapter, we introduce an effective approach used in criminology to overcome the challenges. For simplicity, we use rumor source identification to present the approach.
History
Volume
73Pagination
117-137Publisher DOI
ISSN
1568-2633ISBN-13
978-3-030-02179-5Publication classification
BN Other book chapter, or book chapter not attributed to DeakinPublisher
SpringerPlace of publication
Cham, SwitzerlandTitle of book
Malicious Attack Propagation and Source IdentificationSeries
Advances in Information SecurityUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC