Deakin University
Browse

File(s) not publicly available

Preliminary of modeling malicious attack propagation

Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 10:15
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou
© Springer Nature Switzerland AG 2019. Graphs are usually used to represent networks in different fields such as computer science, biology, and sociology.

History

Volume

73

Pagination

11-19

ISSN

1568-2633

ISBN-13

978-3-030-02179-5

Publication classification

BN Other book chapter, or book chapter not attributed to Deakin

Publisher

Springer

Place of publication

Cham, Switzerland

Title of book

Malicious Attack Propagation and Source Identification

Series

Advances in Information Security

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC