Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"User Influence in the Propagation of Malicious Attacks","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_3","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124550919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"Comparative Study and Numerical Analysis","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_9","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_9","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128842824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"Identifying Propagation Source in Large-Scale Networks","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_12","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_12","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"Source Identification Under Complete Observations: A Maximum Likelihood (ML) Source Estimator","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_6","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127268037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"Preliminary of Identifying Propagation Sources","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_5","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133413049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"Identifying Propagation Source in Time-Varying Networks","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_10","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_10","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"49 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129106372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"Preliminary of Modeling Malicious Attack Propagation","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_2","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_2","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131158174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Future Directions and Conclusion","authors":"Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu","doi":"10.1007/978-3-319-62004-6_15","DOIUrl":"https://doi.org/10.1007/978-3-319-62004-6_15","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121297283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou
{"title":"Source Identification Under Snapshots: A Sample Path Based Source Estimator","authors":"Jiaojiao Jiang, S. Wen, Shui Yu, Bo Liu, Y. Xiang, Wanlei Zhou","doi":"10.1007/978-3-030-02179-5_7","DOIUrl":"https://doi.org/10.1007/978-3-030-02179-5_7","url":null,"abstract":"","PeriodicalId":158458,"journal":{"name":"Malicious Attack Propagation and Source Identification","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134300153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}