Source detection of rumor in social network–a review

S Shelke, V Attar - Online Social Networks and Media, 2019 - Elsevier
The ubiquity of handheld devices provides straightforward access to the Internet and Social
networking. The quick and easy updates from social networks help users in many situations …

Locating multiple sources of contagion in complex networks under the SIR model

X Li, Y Liu, C Zhao, X Zhang, D Yi - Applied Sciences, 2019 - mdpi.com
Simultaneous outbreaks of contagion are a great threat against human life, resulting in great
panic in society. It is urgent for us to find an efficient multiple sources localization method …

Predicting Propagation of Stealthy Worm for Unknown Source in Mobile Edge Computing

Y Sun, F Ren, J Sun, Z Liang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While improving network performance, Mobile Edge Computing (MEC) faces significant
security threats due to User Equipment (UE) vulnerabilities and insecure communication …

Analysis of enhanced SDEx method

P Milczarski, A Hłobaż… - 2017 9th IEEE International …, 2017 - ieeexplore.ieee.org
In the paper, the communication security is discussed. Nowadays applications mainly do not
support end-to-end security. The enhanced SDEx cryptographic method and analysis of its …

Identifying the propagation sources of stealth worms

Y Sun, L Yin, Z Wang, Y Guo, B Fang - International Conference on …, 2018 - Springer
Worm virus can spread in various ways with great destructive power, which poses a great
threat to network security. One example is the WannaCry worm in May 2017. By identifying …

RUMOR SOURCE IDENTIFICATION IN SOCIAL NETWORK WITH LOWEST SEARCH SPACE.

S Shelke, V Attar - Turkish Online Journal of Qualitative …, 2021 - search.ebscohost.com
The rise in social network data leads to extensive information propagation where the
information shared without authenticity results in massive diffusion of rumor. Rumors during …