Author:
Gao Tianyang,Qu Danni,Hu Liqin,Wang Zhen
Publisher
Springer Nature Switzerland
Reference28 articles.
1. Shah, D., Zaman, T.: Detecting sources of computer viruses in networks: theory and experiment. In: Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 203–214 (2010)
2. Shah, D., Zaman, T.: Rumors in a network: who’s the culprit? IEEE Trans. Inf. Theory 57(8), 5163–5181 (2011)
3. Wikipedia. Wickr. [EB/OL] (5 February 2022). https://www.wickr.com/
4. Wikipedia. FireChat. [EB/OL] (5 February 2022). http://opengarden.com/firechat/
5. Chen, J., Chen, L., Chen, Y., et al.: GA-based Q-attack on community detection. IEEE Trans. Comput. Soc. Syst. 6(3), 491–503 (2019)