Weitere Kapitel dieses Buchs durch Wischen aufrufen
The global diffusion of epidemics, computer viruses and rumors causes great damage to our society. One critical issue to identify the multiple diffusion sources so as to timely quarantine them. However, most methods proposed so far are unsuitable for diffusion with multiple sources because of the high computational cost and the complex spatiotemporal diffusion processes. In this chapter, we introduce an effective method to identify multiple diffusion sources, which can address three main issues in this area: (1) How many sources are there? (2) Where did the diffusion emerge? (3) When did the diffusion break out? For simplicity, we use rumor source identification to present the approach.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
D. Brockmann and D. Helbing. The hidden geometry of complex, network-driven contagion phenomena. Science, 342(6164):1337–1342, 2013. CrossRef
Z. Chen, K. Zhu, and L. Ying. Detecting multiple information sources in networks under the sir model. In Information Sciences and Systems (CISS), 2014 48th Annual Conference on, pages 1–4. IEEE, 2014.
V. Fioriti, M. Chinnici, and J. Palomo. Predicting the sources of an outbreak with a spectral technique. Applied Mathematical Sciences, 8(135):6775–6782, 2014. CrossRef
C. Fraser, C. A. Donnelly, S. Cauchemez, W. P. Hanage, M. D. Van Kerkhove, T. D. Hollingsworth, J. Griffin, R. F. Baggaley, H. E. Jenkins, E. J. Lyons, et al. Pandemic potential of a strain of influenza a (h1n1): early findings. science, 324(5934):1557–1561, 2009. CrossRef
H. Jeong, S. P. Mason, A. L. Barabasi, and Z. N. Oltvai. Lethality and centrality in protein networks. Nature, 411(6833):41–42, May 2001. CrossRef
W. Luo and W. P. Tay. Finding an infection source under the sis model. In Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, pages 2930–2934, 2013.
W. Luo, W. P. Tay, and M. Leng. How to identify an infection source with limited observations. IEEE Journal of Selected Topics in Signal Processing, 8(4):586–597, 2014. CrossRef
D. MacRae. 5 viruses to be on the alert for in 2014.
A. R. McLean, R. M. May, J. Pattison, R. A. Weiss, et al. SARS: A case study in emerging infections. Oxford University Press, 2005.
M. E. Newman. A measure of betweenness centrality based on random walks. Social networks, 27(1):39–54, 2005. CrossRef
C. Pash. The lure of naked hollywood star photos sent the internet into meltdown in new zealand. Business Insider Australia, September 7 2014, 4:21 PM.
B. A. Prakash, J. Vreeken, and C. Faloutsos. Efficiently spotting the starting points of an epidemic in a large graph. Knowledge and Information Systems, 38(1):35–59, 2014. CrossRef
M. Rosvall and C. T. Bergstrom. An information-theoretic framework for resolving community structure in complex networks. Proceedings of the National Academy of Sciences, 104(18):7327–7331, 2007. CrossRef
D. Shah and T. Zaman. Detecting sources of computer viruses in networks: Theory and experiment. In Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’10, pages 203–214. ACM, 2010.
W. E. R. Team. Ebola virus disease in west africathe first 9 months of the epidemic and forward projections. N Engl J Med, 371(16):1481–95, 2014. CrossRef
B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM workshop on Online social networks, WOSN ’09, pages 37–42, 2009.
Y. Wang, S. Wen, Y. Xiang, and W. Zhou. Modeling the propagation of worms in networks: A survey. Communications Surveys Tutorials, IEEE, PP(99):1–19, 2013.
D. J. Watts and S. H. Strogatz. Collective dynamics of ‘small-world’ networks. nature, 393(6684):440–442, 1998. CrossRef
S. Wen, W. Zhou, J. Zhang, Y. Xiang, W. Zhou, and W. Jia. Modeling propagation dynamics of social network worms. Parallel and Distributed Systems, IEEE Transactions on, 24(8):1633–1643, 2013. CrossRef
K. Yang, A. H. Shekhar, D. Oliver, and S. Shekhar. Capacity-constrained network-voronoi diagram: a summary of results. In International Symposium on Spatial and Temporal Databases, pages 56–73. Springer, 2013.
K. Zhu and L. Ying. Information source detection in the sir model: a sample-path-based approach. IEEE/ACM Transactions on Networking, 24(1):408–421, 2016. CrossRef
C. C. Zou, D. Towsley, and W. Gong. Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Transactions on dependable and secure computing, 4(2):105–118, 2007. CrossRef
- Identifying Multiple Propagation Sources
- Chapter 11
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com