Back to Search Start Over

Comparative Study and Numerical Analysis

Authors :
Jiaojiao Jiang
Sheng Wen
Bo Liu
Shui Yu
Yang Xiang
Wanlei Zhou
Source :
Malicious Attack Propagation and Source Identification ISBN: 9783030021788
Publication Year :
2018
Publisher :
Springer International Publishing, 2018.

Abstract

This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.

Details

ISBN :
978-3-030-02178-8
ISBNs :
9783030021788
Database :
OpenAIRE
Journal :
Malicious Attack Propagation and Source Identification ISBN: 9783030021788
Accession number :
edsair.doi...........793ea7b4c8c907177e4da95c33a271a2
Full Text :
https://doi.org/10.1007/978-3-030-02179-5_9