Quantcast
Channel: Latest Results
Viewing all articles
Browse latest Browse all 1172

Comparative Study and Numerical Analysis

$
0
0

Abstract

This chapter provides an extensive literature review on identifying the propagation source of malicious attacks by tracing research trends and hierarchically reviewing the contributions along each research line regarding identifying the propagation source of malicious attacks. This chapter consists of three parts. We first review the existing approaches and analyze their pros and cons. Then, numerical studies are provided according to various experiment settings and diffusion scenarios. Finally, we summarize the remarks of existing approaches. Here, we particularly use rumor propagation as an example to analyze these approaches.


Viewing all articles
Browse latest Browse all 1172

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>