Author:
Ding Yong,Cui Xiaoqing,Wang Huiyong,Zhang Kun
Funder
National Natural Science Foundation of China
the National Cryptography Development Foundation of China
Guangxi Key Research and Development Program
the open project of Guangxi Key Lab. of crypto, and Info. Security
GUET Excellent Graduate Thesis Program
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference24 articles.
1. Xu G, Cao Y, Ren Y, Li X, Feng Z (2017) Network security situation awareness based on semantic ontology and user-defined rules for internet of things. IEEE Access 5:21046–21056. https://doi.org/10.1109/ACCESS.2017.2734681
2. Pinto PC, Thiran P, Vetterli M (Aug 2012) Locating the source of diffusion in large-scale networks. Phys Rev Lett 109
3. Shah D, Zaman T (2011) Rumors in a network: Who’s the culprit? IEEE Trans Inf Theory 57:5163–5181
4. Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. Signal Process IEEE Trans 61(11):2850–2865
5. Zhu K, Ying L (2013) Information source detection in the SIR model: a sample path based approach. In Information Theory and Applications Workshop (ITA), pp 1–9
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献