File(s) not publicly available
Preliminary of identifying propagation sources
chapter
posted on 2019-01-01, 00:00 authored by Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei ZhouThis chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.