Login / Signup
Defense against malicious URL spreading in micro-blog network with hub nodes.
Xin Liu
Feng Wang
Yang Yang
Jiuyun Xu
Pingjun Zou
Yiwen Wang
Published in:
Concurr. Comput. Pract. Exp. (2017)
Keyphrases
</>
network structure
website
network nodes
malicious nodes
information propagation
computer networks
network topologies
social networks
wireless sensor networks
intrusion detection
network security
data sets
ddos attacks
knowledge discovery
network traffic