Deakin University
Browse

File(s) not publicly available

Preliminary of identifying propagation sources

Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 14:33
chapter
posted on 2019-01-01, 00:00 authored by Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou
This chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.

History

Title of book

Malicious attack propagation and source identification

Volume

73

Series

Advances in information security

Pagination

65 - 67

Publisher

Springer

Place of publication

Cham, Switzerland

ISSN

1568-2633

ISBN-13

978-3-030-02179-5

Language

eng

Publication classification

B1.1 Book chapter

Copyright notice

2019, Springer Nature Switzerland AG

Editor/Contributor(s)

J Jiang, S Wen, B Liu, S Yu, Y Xiang, W Zhou

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC