Search Results
Search results: 1
-
Malicious Attack Propagation and Source Identification (Advances in Information Security #73)
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multi... More
Language: ENGCopyright: 2019