Deakin University
Browse

File(s) not publicly available

Preliminary of identifying propagation sources

Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 14:33
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou
This chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.

History

Volume

73

Pagination

65-67

ISSN

1568-2633

ISBN-13

978-3-030-02179-5

Language

eng

Publication classification

B1.1 Book chapter

Copyright notice

2019, Springer Nature Switzerland AG

Editor/Contributor(s)

Jiang J, Wen S, Liu B, Yu S, Xiang Y, Zhou W

Publisher

Springer

Place of publication

Cham, Switzerland

Title of book

Malicious attack propagation and source identification

Series

Advances in information security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC