Malicious attack propagation and source identification. (2018)
- Record Type:
- Book
- Title:
- Malicious attack propagation and source identification. (2018)
- Main Title:
- Malicious attack propagation and source identification
- Further Information:
- Note: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
- Authors:
- Jiang, Jiaojiao
Wen, Sheng
Liu, Bo
Yu, Shui
Xiang, Yang
Zhou, Wanlei - Contents:
- Intro; Preface; Acknowledgments; Contents; 1 Introduction; 1.1 Malicious Attacks; 1.2 Examples of Malicious Attacks; 1.3 Propagation Mechanism of Malicious Attacks; 1.4 Source Identification of Malicious Attack Propagation; 1.5 Outline and Book Overview; Part I Malicious Attack Propagation; 2 Preliminary of Modeling Malicious Attack Propagation; 2.1 Graph Theory; 2.2 Network Topologies; 2.3 Community Structure; 2.4 Information Diffusion Models; 3 User Influence in the Propagation of Malicious Attacks; 3.1 Introduction; 3.2 Problem Statement; 3.3 Epidemic Betweenness 3.3.1 Information Propagation Model3.3.2 Epidemic Influence; 3.3.3 Computation of Epidemic Betweenness; 3.3.4 Simple Examples; 3.3.5 Computational Complexity; 3.4 Evaluations; 3.4.1 Accuracy in Measuring Influence; 3.4.2 Comparison with Other Measures of Influence; 3.5 Correlation Analysis; 3.5.1 Correlation with Traditional Betweenness; 3.5.2 Correlation with Classic Centrality Measures; 3.6 Related Work; 3.7 Summary; 4 Restrain Malicious Attack Propagation; 4.1 Introduction; 4.2 Methods of Restraining Rumors; 4.2.1 Controlling Influential Users; 4.2.2 Controlling Community Bridges 4.2.3 Clarification Through Spreading Truths4.3 Propagation Modeling Primer; 4.3.1 Modeling Nodes, Topology and Social Factors; 4.3.2 Modeling Propagation Dynamics; 4.3.3 Modeling People Making Choices; 4.3.4 The Accuracy of the Modelling; 4.4 Block Rumors at Important Users; 4.4.1 Empirical Studies; 4.4.2 Theoretical Studies; 4.5Intro; Preface; Acknowledgments; Contents; 1 Introduction; 1.1 Malicious Attacks; 1.2 Examples of Malicious Attacks; 1.3 Propagation Mechanism of Malicious Attacks; 1.4 Source Identification of Malicious Attack Propagation; 1.5 Outline and Book Overview; Part I Malicious Attack Propagation; 2 Preliminary of Modeling Malicious Attack Propagation; 2.1 Graph Theory; 2.2 Network Topologies; 2.3 Community Structure; 2.4 Information Diffusion Models; 3 User Influence in the Propagation of Malicious Attacks; 3.1 Introduction; 3.2 Problem Statement; 3.3 Epidemic Betweenness 3.3.1 Information Propagation Model3.3.2 Epidemic Influence; 3.3.3 Computation of Epidemic Betweenness; 3.3.4 Simple Examples; 3.3.5 Computational Complexity; 3.4 Evaluations; 3.4.1 Accuracy in Measuring Influence; 3.4.2 Comparison with Other Measures of Influence; 3.5 Correlation Analysis; 3.5.1 Correlation with Traditional Betweenness; 3.5.2 Correlation with Classic Centrality Measures; 3.6 Related Work; 3.7 Summary; 4 Restrain Malicious Attack Propagation; 4.1 Introduction; 4.2 Methods of Restraining Rumors; 4.2.1 Controlling Influential Users; 4.2.2 Controlling Community Bridges 4.2.3 Clarification Through Spreading Truths4.3 Propagation Modeling Primer; 4.3.1 Modeling Nodes, Topology and Social Factors; 4.3.2 Modeling Propagation Dynamics; 4.3.3 Modeling People Making Choices; 4.3.4 The Accuracy of the Modelling; 4.4 Block Rumors at Important Users; 4.4.1 Empirical Studies; 4.4.2 Theoretical Studies; 4.5 Clarify Rumors Using Truths; 4.5.1 Impact of the Truth Injection Time; 4.5.2 Impact of the Truth Propagation Probability; 4.6 A Hybrid Measure of Restraining Rumors; 4.6.1 Measures Working Together; 4.6.2 Equivalence of Measures; 4.7 Summary 4.7.1 The Robustness of the Contagious Ability4.7.2 The Fairness to the Community Bridges; Part II Source Identification of Malicious Attack Propagation; 5 Preliminary of Identifying Propagation Sources; 5.1 Observations on Malicious Attack Propagation; 5.2 Maximum-Likelihood Estimation; 5.3 Efficiency Measures; 6 Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator; 6.1 Introduction; 6.2 The SI Model for Information Propagation; 6.3 Rumor Source Estimator: Maximum Likelihood (ML); 6.4 Rumor Source Estimator: ML for Regular Trees 6.5 Rumor Source Estimator: ML for General Trees6.6 Rumor Source Estimator: ML for General Graphs; 6.7 Rumor Centrality; 6.7.1 Rumor Centrality: Succinct Representation; 6.7.2 Rumor Centrality Versus Distance Centrality; 7 Source Identification Under Snapshots: A Sample Path Based Source Estimator; 7.1 Introduction; 7.2 The SIR Model for Information Propagation; 7.3 Maximum Likelihood Detection; 7.4 Sample Path Based Detection; 7.5 The Sample Path Based Estimator; 7.6 Reverse Infection Algorithm; 8 Source Identification Under Sensor Observations: A Gaussian Source Estimator; 8.1 Introduction … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 005.8
Computer security
Computer networks -- Security measures
Data encryption (Computer science)
COMPUTERS / Security / General
Computer networks -- Security measures
Computer security
Data encryption (Computer science)
Electronic books - Languages:
- English
- ISBNs:
- 9783030021795
3030021793 - Related ISBNs:
- 9783030021788
3030021785 - Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed November 27, 2018) - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.377959
- Ingest File:
- 02_359.xml