File(s) not publicly available
Preliminary of modeling malicious attack propagation
Version 2 2024-06-18, 13:19Version 2 2024-06-18, 13:19
Version 1 2019-06-27, 10:15Version 1 2019-06-27, 10:15
chapter
posted on 2024-06-18, 13:19 authored by J Jiang, S Wen, S Yu, B Liu, Y Xiang, W Zhou© Springer Nature Switzerland AG 2019. Graphs are usually used to represent networks in different fields such as computer science, biology, and sociology.
History
Volume
73Pagination
11-19Publisher DOI
ISSN
1568-2633ISBN-13
978-3-030-02179-5Publication classification
BN Other book chapter, or book chapter not attributed to DeakinPublisher
SpringerPlace of publication
Cham, SwitzerlandTitle of book
Malicious Attack Propagation and Source IdentificationSeries
Advances in Information SecurityUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC