Abstract
While previous chapters provide a thorough description on malicious attack propagation and source identification, many interesting and promising issues remain unexplored. The development of online social networks provides great opportunities for research on restraining malicious attacks and identifying attack sources, but also presents a challenge in effective utilization of the large volume of data. There are still other topics that need to be considered in malicious attack propagation and source identification, and we consider a few directions that are worthy of future attention.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Jiang, J., Wen, S., Yu, S., Liu, B., Xiang, Y., Zhou, W. (2019). Future Directions and Conclusion. In: Malicious Attack Propagation and Source Identification. Advances in Information Security, vol 73. Springer, Cham. https://doi.org/10.1007/978-3-030-02179-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-02179-5_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02178-8
Online ISBN: 978-3-030-02179-5
eBook Packages: Computer ScienceComputer Science (R0)