Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Front Matter 1. Introduction Part I. Malicious Attack Propagation
2. Preliminary of Modeling Malicious Attack Propagation 3. User Influence in the Propagation of Malicious Attacks 4. Restrain Malicious Attack Propagation
Part II. Source Identification of Malicious Attack Propagation
5. Preliminary of Identifying Propagation Sources 6. Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator 7. Source Identification Under Snapshots: A Sample Path Based Source Estimator 8. Source Identification Under Sensor Observations: A Gaussian Source Estimator 9. Comparative Study and Numerical Analysis
Part III. Critical Research Issues in Source Identification
10. Identifying Propagation Source in Time-Varying Networks 11. Identifying Multiple Propagation Sources 12. Identifying Propagation Source in Large-Scale Networks 13. Future Directions and Conclusion
Back Matter
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion