Malicious Attack Propagation and Source Identification Book uri icon

abstract

  • Then, can we model the way that malicious attack spreads in time-varying networks? Can we estimate the probability of an arbitrary node being infected by a malicious attack? How do we detect the propagation source of a malicious attack in ...

authors

  • Jiang, Jiaojiao
  • Wen, Sheng
  • Liu, Bo
  • Yu, Shui
  • Xiang, Yang
  • Zhou, Wanlei

publication date

  • 2019