Source detection of rumor in social network–a review
The ubiquity of handheld devices provides straightforward access to the Internet and Social
networking. The quick and easy updates from social networks help users in many situations …
networking. The quick and easy updates from social networks help users in many situations …
Locating multiple sources of contagion in complex networks under the SIR model
Simultaneous outbreaks of contagion are a great threat against human life, resulting in great
panic in society. It is urgent for us to find an efficient multiple sources localization method …
panic in society. It is urgent for us to find an efficient multiple sources localization method …
Predicting Propagation of Stealthy Worm for Unknown Source in Mobile Edge Computing
Y Sun, F Ren, J Sun, Z Liang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While improving network performance, Mobile Edge Computing (MEC) faces significant
security threats due to User Equipment (UE) vulnerabilities and insecure communication …
security threats due to User Equipment (UE) vulnerabilities and insecure communication …
Analysis of enhanced SDEx method
In the paper, the communication security is discussed. Nowadays applications mainly do not
support end-to-end security. The enhanced SDEx cryptographic method and analysis of its …
support end-to-end security. The enhanced SDEx cryptographic method and analysis of its …
Identifying the propagation sources of stealth worms
Y Sun, L Yin, Z Wang, Y Guo, B Fang - International Conference on …, 2018 - Springer
Worm virus can spread in various ways with great destructive power, which poses a great
threat to network security. One example is the WannaCry worm in May 2017. By identifying …
threat to network security. One example is the WannaCry worm in May 2017. By identifying …
RUMOR SOURCE IDENTIFICATION IN SOCIAL NETWORK WITH LOWEST SEARCH SPACE.
The rise in social network data leads to extensive information propagation where the
information shared without authenticity results in massive diffusion of rumor. Rumors during …
information shared without authenticity results in massive diffusion of rumor. Rumors during …