找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Malicious Attack Propagation and Source Identification; Jiaojiao Jiang,Sheng Wen,Wanlei Zhou Book 2019 Springer Nature Switzerland AG 2019

[復制鏈接]
查看: 48883|回復: 49
樓主
發(fā)表于 2025-3-21 17:21:54 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Malicious Attack Propagation and Source Identification
編輯Jiaojiao Jiang,Sheng Wen,Wanlei Zhou
視頻videohttp://file.papertrans.cn/622/621960/621960.mp4
概述Provides detailed coverage on modeling the propagation of malicious attack.Includes examples on various application scenarios that help the reader to understand how to use these models in real-world s
叢書名稱Advances in Information Security
圖書封面Titlebook: Malicious Attack Propagation and Source Identification;  Jiaojiao Jiang,Sheng Wen,Wanlei Zhou Book 2019 Springer Nature Switzerland AG 2019
描述.This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously ?illustrate in this book. .?.In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as .a rumor spreading through a network., where the goal is to find the source of the rumor so as to control and prevent network risks. So fa
出版日期Book 2019
關鍵詞rumor; online social networks; source identification; information propagation; single source; multiple so
版次1
doihttps://doi.org/10.1007/978-3-030-02179-5
isbn_ebook978-3-030-02179-5Series ISSN 1568-2633 Series E-ISSN 2512-2193
issn_series 1568-2633
copyrightSpringer Nature Switzerland AG 2019
The information of publication is updating

書目名稱Malicious Attack Propagation and Source Identification影響因子(影響力)




書目名稱Malicious Attack Propagation and Source Identification影響因子(影響力)學科排名




書目名稱Malicious Attack Propagation and Source Identification網(wǎng)絡公開度




書目名稱Malicious Attack Propagation and Source Identification網(wǎng)絡公開度學科排名




書目名稱Malicious Attack Propagation and Source Identification被引頻次




書目名稱Malicious Attack Propagation and Source Identification被引頻次學科排名




書目名稱Malicious Attack Propagation and Source Identification年度引用




書目名稱Malicious Attack Propagation and Source Identification年度引用學科排名




書目名稱Malicious Attack Propagation and Source Identification讀者反饋




書目名稱Malicious Attack Propagation and Source Identification讀者反饋學科排名




單選投票, 共有 1 人參與投票
 

1票 100.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權限
沙發(fā)
發(fā)表于 2025-3-21 22:26:40 | 只看該作者
Preliminary of Modeling Malicious Attack PropagationGraphs are usually used to represent networks in different fields such as computer science, biology, and sociology.
板凳
發(fā)表于 2025-3-22 03:01:53 | 只看該作者
地板
發(fā)表于 2025-3-22 06:49:02 | 只看該作者
Identifying Propagation Source in Large-Scale Networksd promptly quarantine them. However, one critical issue of current methods is that they are far are unsuitable for large-scale networks due to the computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce a community structure based approach to efficiently identify diffusion sources in large networks.
5#
發(fā)表于 2025-3-22 09:43:57 | 只看該作者
https://doi.org/10.1007/978-3-030-02179-5rumor; online social networks; source identification; information propagation; single source; multiple so
6#
發(fā)表于 2025-3-22 16:02:40 | 只看該作者
Springer Nature Switzerland AG 2019
7#
發(fā)表于 2025-3-22 19:51:49 | 只看該作者
Malicious Attack Propagation and Source Identification978-3-030-02179-5Series ISSN 1568-2633 Series E-ISSN 2512-2193
8#
發(fā)表于 2025-3-22 23:11:23 | 只看該作者
Jiaojiao Jiang,Sheng Wen,Wanlei ZhouProvides detailed coverage on modeling the propagation of malicious attack.Includes examples on various application scenarios that help the reader to understand how to use these models in real-world s
9#
發(fā)表于 2025-3-23 04:13:09 | 只看該作者
10#
發(fā)表于 2025-3-23 07:26:15 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 00:11
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
洪江市| 靖安县| 长宁县| 贺州市| 浦北县| 兴化市| 威信县| 陆良县| 耒阳市| 灵石县| 当涂县| 水城县| 诸城市| 礼泉县| 大连市| 信丰县| 渝中区| 浮山县| 吉安市| 津市市| 日土县| 阳原县| 岱山县| 株洲市| 恩施市| 长沙市| 石门县| 临邑县| 壶关县| 友谊县| 青冈县| 石家庄市| 焦作市| 临湘市| 夏邑县| 保康县| 邵武市| 慈溪市| 宝应县| 乐清市| 黄浦区|