Future directions and conclusion

Publication Type:
Chapter
Citation:
Advances in Information Security, 2019, 73 pp. 179 - 181
Issue Date:
2019-01-01
Filename Size
ch13.pdf6.25 MB
Adobe PDF
Full metadata record
© Springer Nature Switzerland AG 2019. While previous chapters provide a thorough description on malicious attack propagation and source identification, many interesting and promising issues remain unexplored. The development of online social networks provides great opportunities for research on restraining malicious attacks and identifying attack sources, but also presents a challenge in effective utilization of the large volume of data. There are still other topics that need to be considered in malicious attack propagation and source identification, and we consider a few directions that are worthy of future attention.
Please use this identifier to cite or link to this item: