- Добавил: literator
- Дата: 26-09-2019, 19:27
- Комментариев: 0
Название: Malicious Attack Propagation and Source Identification
Автор: Jiaojiao Jiang, Sheng Wen
Издательство: Springer
Год: 2019
Страниц: 192
Язык: английский
Формат: pdf (true)
Размер: 13.5 MB
In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches.
Автор: Jiaojiao Jiang, Sheng Wen
Издательство: Springer
Год: 2019
Страниц: 192
Язык: английский
Формат: pdf (true)
Размер: 13.5 MB
In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches.