Malicious attack propagation and sou...
Jiang, Jiaojiao.

Linked to FindBook      Google Book      Amazon      博客來     
  • Malicious attack propagation and source identification
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Malicious attack propagation and source identification/ by Jiaojiao Jiang ... [et al.].
    other author: Jiang, Jiaojiao.
    Published: Cham :Springer International Publishing : : 2019.,
    Description: xii, 192 p. :ill., digital ;24 cm.
    [NT 15003449]: 1 Introduction -- 2 Preliminary of Modeling Malicious Attack Propagation -- 3 User Influence in the Propagation of Malicious Attacks -- 4 Restrain Malicious Attack Propagation -- 5 Preliminary of Identifying Propagation Sources -- 6 Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator -- 7 Source Identification Under Snapshots: A Sample Path Based Source Estimator -- 8 Source Identification Under Sensor Observations: A Gaussian Source Estimator -- 9 Comparative Study and Numerical Analysis -- 10 Identifying Propagation Source in Time-varying Networks -- 11 Identifying Multiple Propagation Sources -- 12 Identifying Propagation Source in Large-scale Networks -- 13 Future Directions and Conclusion.
    Contained By: Springer eBooks
    Subject: Computer security. -
    Online resource: https://doi.org/10.1007/978-3-030-02179-5
    ISBN: 9783030021795
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login