Detecting Cascades from Weak Signatures.

IEEE Transactions on Network Science and Engineering(2018)

引用 0|浏览76
暂无评分
摘要
Inspired by cyber-security applications, we consider the problem of detecting an infection process in a network when the indication that any particular node is infected is extremely noisy. Instead of waiting for a single node to provide sufficient evidence that it is indeed infected, we take advantage of the graph structure to detect cascades of weak indications of failures. We view the detection ...
更多
查看译文
关键词
Malware,Computer security,Network topology,Algorithm design and analysis,Computer viruses
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要