Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies

IEEE Communications Surveys and Tutorials - Tập 19 Số 1 - Trang 465-481 - 2017
Jiaojiao Jiang1, Sheng Wen1, Shui Yu1, Yang Xiang1, Wanlei Zhou1
1School of Information Technology, Deakin University, Melbourne, Australia

Tóm tắt

Từ khóa


Tài liệu tham khảo

fossi, 2011, Symantec Internet security threat report 2010

10.1145/1935826.1935845

2014, Power Grid Network Data Set

jitesh, 2009, The Enron email dataset database schema and brief statistical report

10.1109/TPDS.2012.250

10.1109/SASOW.2014.35

dagon, 2006, Modeling botnet propagation using time zones, Proc NDSS, 6, 2

10.1086/228631

manitz, 2016, Source estimation for propagation processes on complex networks with an application to delays in public transportation systems, J Roy Statist Soc Ser C (Appl Statist )

10.1007/10692760_25

10.1145/2318857.2254784

10.1109/Allerton.2012.6483426

10.1103/PhysRevE.65.056109

10.1016/0378-8733(78)90021-7

10.1093/acprof:oso/9780199206650.003.0017

faloutsos, 1999, On power-law relationships of the Internet topology, Proc Conf Appl Technol Architect Protocols Comput Commun (SIGCOMM), 251

dekker, 2008, Centrality in social networks: Theoretical and simulation approaches, Proc SimTecT, 12

10.1016/0378-8733(94)00248-9

10.1145/1811039.1811063

10.1038/nature10011

10.1109/SURV.2012.032612.00004

10.1145/948187.948190

10.1007/978-1-4419-8462-3_6

10.1145/586110.586130

xiang, 2009, Propagation of active worms: A survey, Int J Comput Syst Sci Eng, 24, 157

10.1109/MSECP.2003.1219056

10.1007/s002850050051

wood, 2012, Symantec Internet security threat report 2011

10.1109/ICASSP.2011.5946292

10.1038/35019019

10.1109/COMPSAC.2008.205

10.1038/30918

10.1103/PhysRevE.84.056105

10.1109/SURV.2013.100913.00195

10.1145/2184319.2184338

agaskar, 2013, A fast Monte Carlo algorithm for source localization on graphs, Proc SPIE Opt Eng Appl

seo, 2012, Identifying rumors and their sources in social networks, Proc SPIE Defense Security Sens

10.1103/PhysRevLett.109.068702

10.1016/j.physa.2010.10.001

10.1109/INFOCOM.2014.6848164

10.1137/S0036144500371907

10.1109/ICCT.2006.342006

10.1126/science.1245200

zhu, 2013, Information source detection in the SIR model: A sample path based approach, Proc Inf Theory Appl Workshop (ITA), 1

10.1145/2487575.2487639

10.1109/TSP.2006.889975

10.1103/PhysRevLett.112.118701

10.1109/INFCOMW.2014.6849253

brockmann, 2013, Supplementary materials for the hidden geometry of complex, network-driven contagion phenomena, Science, 342, 1337, 10.1126/science.1245200

10.1103/PhysRevE.82.016101

lokhov, 2013, Inferring the origin of an epidemic with a dynamic message-passing algorithm, Phys Rev E, 90

10.1109/ICASSP.2013.6638194

10.1145/2318857.2254782

10.1109/ISIT.2013.6620613

10.1057/978-1-349-95121-5_2565-1

10.1109/TSP.2013.2256902

10.1109/MILCOM.2012.6415780

10.1109/TNET.2014.2364972

10.1109/JSTSP.2014.2315533

10.1007/s13278-016-0373-6

10.1109/SECON.2012.6275788

10.1145/1835804.1835933

10.12988/ams.2014.49693

10.1109/ICDM.2012.136

10.1109/ACSSC.2012.6489274

10.1145/2983323.2983817

richardson, 2008, CSI COMPUTER CRIME AND SECURITY SURVEY, 1, 1

10.1109/SURV.2012.021312.00034

sekar, 2004, Toward a framework for Internet forensic analysis, Proc ACM HotNets-III

10.1145/347057.347560

10.1145/1835804.1835937

xie, 2005, Worm origin identification using random moonwalks, Proc IEEE Symp Security Privacy, 242

10.1103/PhysRevLett.97.094102

10.1109/CISS.2014.6814143

10.1007/s10115-013-0671-5

10.1016/j.procs.2014.05.040

10.1140/epjb/e2012-21019-2

grünwald, 2007, The Minimum Description Length Principle, 10.7551/mitpress/4643.001.0001

10.1145/2591971.2591993

10.1109/TIT.2011.2158885

10.1287/ijoc.4.4.412

10.1109/ISIT.2013.6620711