Abstract
In this chapter, we introduce a propagation source estimator under sensor observations: Gaussian source estimator. According to Chap. 5, sensors are firstly injected into networks, and then the propagation dynamics over these sensor nodes are collected, including their states, state transition time and infection directions. There have been many approaches proposed under sensor observations, including Bayesian based method, Gaussian based method, Moon-Walk based method, etc. Here, we particular present the details of the Bayesian based method. For the techniques involved in other methods, readers could refer to Chap. 9 for details.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
P. C. Pinto, P. Thiran, and M. Vetterli. Locating the source of diffusion in large-scale networks. Phys. Rev. Lett., 109, Aug 2012.
D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.
D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? IEEE Transactions on information theory, 57(8):5163–5181, 2011.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jiang, J., Wen, S., Yu, S., Liu, B., Xiang, Y., Zhou, W. (2019). Source Identification Under Sensor Observations: A Gaussian Source Estimator. In: Malicious Attack Propagation and Source Identification. Advances in Information Security, vol 73. Springer, Cham. https://doi.org/10.1007/978-3-030-02179-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-02179-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02178-8
Online ISBN: 978-3-030-02179-5
eBook Packages: Computer ScienceComputer Science (R0)