2017
DOI: 10.48550/arxiv.1705.06604
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Analysis of the effectiveness of the truth-spreading strategy for inhibiting rumors

Lu-Xing Yang,
Pengdeng Li,
Xiaofan Yang
et al.

Abstract: Spreading truths is recognized as a feasible strategy for inhibiting rumors. This paper is devoted to assessing the effectiveness of the truth-spreading strategy. An individual-level rumor-truth spreading model (the generic URTU model) is derived. Under the model, two criteria for the termination of a rumor are presented. These criteria capture the influence of the network structures on the effectiveness of the truth-spreading strategy. Extensive simulations show that, when the rumor or the truth terminates, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 50 publications
0
1
0
Order By: Relevance
“…To measure the security of a cyber network under APTs, an APT-based cyber attack-defense process must be modeled as a continuous-time dynamical system. The individual-level dynamical modeling technique, which has been applied to areas such as epidemic spreading [19][20][21], malware spreading [22][23][24][25][26][27][28][29], rumor spreading [30,31] and viral marketing [32], is especially suited to the modeling of APT-based cyber attack-defense processes, because the topological structure of the targeted cyber network can be accommodated [33]. Towards this direction, a number of APT-based cyber attack-defense models have been proposed [34][35][36].…”
Section: Introductionmentioning
confidence: 99%
“…To measure the security of a cyber network under APTs, an APT-based cyber attack-defense process must be modeled as a continuous-time dynamical system. The individual-level dynamical modeling technique, which has been applied to areas such as epidemic spreading [19][20][21], malware spreading [22][23][24][25][26][27][28][29], rumor spreading [30,31] and viral marketing [32], is especially suited to the modeling of APT-based cyber attack-defense processes, because the topological structure of the targeted cyber network can be accommodated [33]. Towards this direction, a number of APT-based cyber attack-defense models have been proposed [34][35][36].…”
Section: Introductionmentioning
confidence: 99%