Hardback
Add to list Added to list Malicious Attack Propagation and Source Identification
Jiaojiao Jiang,Sheng Wen,Bo Liu,Shui Yu,Yang Xiang
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;
Available to order, ships in 7-14 daysAvailable to order