Version 2 2024-06-18, 13:19Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 14:33Version 1 2019-06-27, 14:33
chapter
posted on 2024-06-18, 13:19authored byJ Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou
This chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.
History
Volume
73
Pagination
65-67
ISSN
1568-2633
ISBN-13
978-3-030-02179-5
Language
eng
Publication classification
B1.1 Book chapter
Copyright notice
2019, Springer Nature Switzerland AG
Editor/Contributor(s)
Jiang J, Wen S, Liu B, Yu S, Xiang Y, Zhou W
Publisher
Springer
Place of publication
Cham, Switzerland
Title of book
Malicious attack propagation and source identification