Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Front Matter
1. Introduction
Part I. Malicious Attack Propagation
2. Preliminary of Modeling Malicious Attack Propagation
3. User Influence in the Propagation of Malicious Attacks
4. Restrain Malicious Attack Propagation
Part II. Source Identification of Malicious Attack Propagation
5. Preliminary of Identifying Propagation Sources
6. Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator
7. Source Identification Under Snapshots: A Sample Path Based Source Estimator
8. Source Identification Under Sensor Observations: A Gaussian Source Estimator
9. Comparative Study and Numerical Analysis
Part III. Critical Research Issues in Source Identification
10. Identifying Propagation Source in Time-Varying Networks
11. Identifying Multiple Propagation Sources
12. Identifying Propagation Source in Large-Scale Networks
13. Future Directions and Conclusion
Back Matter
← Prev
Back
Next →
← Prev
Back
Next →