{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T07:59:10Z","timestamp":1775203150193,"version":"3.50.1"},"reference-count":82,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2016.2615098","type":"journal-article","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T18:46:51Z","timestamp":1475606811000},"page":"465-481","source":"Crossref","is-referenced-by-count":188,"title":["Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7307-8114","authenticated-orcid":false,"given":"Jiaojiao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5252-0831","authenticated-orcid":false,"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","article-title":"Symantec Internet security threat report 2010","author":"fossi","year":"2011"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"ref71","year":"2014","journal-title":"Power Grid Network Data Set"},{"key":"ref70","article-title":"The Enron email dataset database schema and brief statistical report","author":"jitesh","year":"2009"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.250"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2014.35"},{"key":"ref74","first-page":"2","article-title":"Modeling botnet propagation using time zones","volume":"6","author":"dagon","year":"2006","journal-title":"Proc NDSS"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1086\/228631"},{"key":"ref75","article-title":"Source estimation for propagation processes on complex networks with an application to delays in public transportation systems","author":"manitz","year":"2016","journal-title":"J Roy Statist Soc Ser C (Appl Statist )"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/10692760_25"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2318857.2254784"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483426"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.003.0017"},{"key":"ref30","first-page":"251","article-title":"On power-law relationships of the Internet topology","author":"faloutsos","year":"1999","journal-title":"Proc Conf Appl Technol Architect Protocols Comput Commun (SIGCOMM)"},{"key":"ref37","first-page":"12","article-title":"Centrality in social networks: Theoretical and simulation approaches","author":"dekker","year":"2008","journal-title":"Proc SimTecT"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(94)00248-9"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811063"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/nature10011"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.032612.00004"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/948187.948190"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8462-3_6"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"ref28","first-page":"157","article-title":"Propagation of active worms: A survey","volume":"24","author":"xiang","year":"2009","journal-title":"Int J Comput Syst Sci Eng"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s002850050051"},{"key":"ref65","article-title":"Symantec Internet security threat report 2011","author":"wood","year":"2012"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946292"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.205"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.84.056105"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2184319.2184338"},{"key":"ref20","article-title":"A fast Monte Carlo algorithm for source localization on graphs","author":"agaskar","year":"2013","journal-title":"Proc SPIE Opt Eng Appl"},{"key":"ref22","article-title":"Identifying rumors and their sources in social networks","author":"seo","year":"2012","journal-title":"Proc SPIE Defense Security Sens"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.068702"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2010.10.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848164"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144500371907"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2006.342006"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1126\/science.1245200"},{"key":"ref51","first-page":"1","article-title":"Information source detection in the SIR model: A sample path based approach","author":"zhu","year":"2013","journal-title":"Proc Inf Theory Appl Workshop (ITA)"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487639"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.889975"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.112.118701"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849253"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.1126\/science.1245200","article-title":"Supplementary materials for the hidden geometry of complex, network-driven contagion phenomena","volume":"342","author":"brockmann","year":"2013","journal-title":"Science"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.82.016101"},{"key":"ref53","article-title":"Inferring the origin of an epidemic with a dynamic message-passing algorithm","volume":"90","author":"lokhov","year":"2013","journal-title":"Phys Rev E"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638194"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2318857.2254782"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620613"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-349-95121-5_2565-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2256902"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415780"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2364972"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2315533"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-016-0373-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275788"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835933"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.12988\/ams.2014.49693"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.136"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2012.6489274"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983817"},{"key":"ref4","first-page":"1","volume":"1","author":"richardson","year":"2008","journal-title":"CSI COMPUTER CRIME AND SECURITY SURVEY"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00034"},{"key":"ref6","article-title":"Toward a framework for Internet forensic analysis","author":"sekar","year":"2004","journal-title":"Proc ACM HotNets-III"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347560"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835937"},{"key":"ref7","first-page":"242","article-title":"Worm origin identification using random moonwalks","author":"xie","year":"2005","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.97.094102"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2014.6814143"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0671-5"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.05.040"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2012-21019-2"},{"key":"ref47","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4643.001.0001","author":"gr\u00fcnwald","year":"2007","journal-title":"The Minimum Description Length Principle"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2591993"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2158885"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.4.4.412"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620711"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7862305\/07582484.pdf?arnumber=7582484","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:12:04Z","timestamp":1642003924000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7582484\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":82,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2016.2615098","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}