找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Malicious Attack Propagation and Source Identification; Jiaojiao Jiang,Sheng Wen,Wanlei Zhou Book 2019 Springer Nature Switzerland AG 2019

[復(fù)制鏈接]
查看: 48887|回復(fù): 49
樓主
發(fā)表于 2025-3-21 17:21:54 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Malicious Attack Propagation and Source Identification
編輯Jiaojiao Jiang,Sheng Wen,Wanlei Zhou
視頻videohttp://file.papertrans.cn/622/621960/621960.mp4
概述Provides detailed coverage on modeling the propagation of malicious attack.Includes examples on various application scenarios that help the reader to understand how to use these models in real-world s
叢書名稱Advances in Information Security
圖書封面Titlebook: Malicious Attack Propagation and Source Identification;  Jiaojiao Jiang,Sheng Wen,Wanlei Zhou Book 2019 Springer Nature Switzerland AG 2019
描述.This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously ?illustrate in this book. .?.In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as .a rumor spreading through a network., where the goal is to find the source of the rumor so as to control and prevent network risks. So fa
出版日期Book 2019
關(guān)鍵詞rumor; online social networks; source identification; information propagation; single source; multiple so
版次1
doihttps://doi.org/10.1007/978-3-030-02179-5
isbn_ebook978-3-030-02179-5Series ISSN 1568-2633 Series E-ISSN 2512-2193
issn_series 1568-2633
copyrightSpringer Nature Switzerland AG 2019
The information of publication is updating

書目名稱Malicious Attack Propagation and Source Identification影響因子(影響力)




書目名稱Malicious Attack Propagation and Source Identification影響因子(影響力)學(xué)科排名




書目名稱Malicious Attack Propagation and Source Identification網(wǎng)絡(luò)公開度




書目名稱Malicious Attack Propagation and Source Identification網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Malicious Attack Propagation and Source Identification被引頻次




書目名稱Malicious Attack Propagation and Source Identification被引頻次學(xué)科排名




書目名稱Malicious Attack Propagation and Source Identification年度引用




書目名稱Malicious Attack Propagation and Source Identification年度引用學(xué)科排名




書目名稱Malicious Attack Propagation and Source Identification讀者反饋




書目名稱Malicious Attack Propagation and Source Identification讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

1票 100.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:26:40 | 只看該作者
Preliminary of Modeling Malicious Attack PropagationGraphs are usually used to represent networks in different fields such as computer science, biology, and sociology.
板凳
發(fā)表于 2025-3-22 03:01:53 | 只看該作者
地板
發(fā)表于 2025-3-22 06:49:02 | 只看該作者
Identifying Propagation Source in Large-Scale Networksd promptly quarantine them. However, one critical issue of current methods is that they are far are unsuitable for large-scale networks due to the computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce a community structure based approach to efficiently identify diffusion sources in large networks.
5#
發(fā)表于 2025-3-22 09:43:57 | 只看該作者
https://doi.org/10.1007/978-3-030-02179-5rumor; online social networks; source identification; information propagation; single source; multiple so
6#
發(fā)表于 2025-3-22 16:02:40 | 只看該作者
Springer Nature Switzerland AG 2019
7#
發(fā)表于 2025-3-22 19:51:49 | 只看該作者
Malicious Attack Propagation and Source Identification978-3-030-02179-5Series ISSN 1568-2633 Series E-ISSN 2512-2193
8#
發(fā)表于 2025-3-22 23:11:23 | 只看該作者
Jiaojiao Jiang,Sheng Wen,Wanlei ZhouProvides detailed coverage on modeling the propagation of malicious attack.Includes examples on various application scenarios that help the reader to understand how to use these models in real-world s
9#
發(fā)表于 2025-3-23 04:13:09 | 只看該作者
10#
發(fā)表于 2025-3-23 07:26:15 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 00:20
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
张家口市| 临高县| 湘阴县| 商洛市| 东辽县| 天门市| 蕲春县| 上高县| 江西省| 城固县| 如皋市| 凭祥市| 陈巴尔虎旗| 阳曲县| 望江县| 乐至县| 江都市| 赤壁市| 剑河县| 昆山市| 卓资县| 永新县| 桃江县| 曲松县| 灵丘县| 武乡县| 平阳县| 乐安县| 高邮市| 洪洞县| 图们市| 余江县| 抚州市| 乌兰察布市| 蓝田县| 石泉县| 永寿县| 潼南县| 洞口县| 嘉鱼县| 宿州市|