Future directions and conclusion
- Publication Type:
- Chapter
- Citation:
- Advances in Information Security, 2019, 73 pp. 179 - 181
- Issue Date:
- 2019-01-01
Recently Added
Copyright Clearance Process
- Recently Added
- In Progress
- Open Access
This item is new to OPUS and is not currently available.
© Springer Nature Switzerland AG 2019. While previous chapters provide a thorough description on malicious attack propagation and source identification, many interesting and promising issues remain unexplored. The development of online social networks provides great opportunities for research on restraining malicious attacks and identifying attack sources, but also presents a challenge in effective utilization of the large volume of data. There are still other topics that need to be considered in malicious attack propagation and source identification, and we consider a few directions that are worthy of future attention.
Please use this identifier to cite or link to this item: