Comparative study and numerical analysis

Publication Type:
Advances in Information Security, 2019, 73 pp. 95 - 114
Issue Date:
Full metadata record
© Springer Nature Switzerland AG 2019. This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.
Please use this identifier to cite or link to this item: