Preliminary of identifying propagation sources
- Publication Type:
- Chapter
- Citation:
- Advances in Information Security, 2019, 73 pp. 65 - 67
- Issue Date:
- 2019-01-01
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
Preliminary of identifying propagation sources WZ.pdf | Published version | 600.51 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
© Springer Nature Switzerland AG 2019. This chapter provides some primary knowledge about identifying propagation sources of malicious attacks. We first introduce different types of observations about the propagation of malicious attacks. Then, we present the maximum-likelihood estimation method adopted by many approaches in this research area. We finally introduce the evaluation metrics for source identification.
Please use this identifier to cite or link to this item: