56. [Dong et al., 2013] W. Dong, W. Zhang, and C. W. Tan, “Rooting out the rumor culprit
from suspects,” ISIT 2013, pp.2671–2675, 7-12 July 2013.
[Kuba and Prodinger, 2010] M. Kuba and H. Prodinger, “A note on Stirling series,”
Integers, vol. 10, no. 4, pp. 393–406, 2010.
[Luo et al., 2014] W. Luo, W. P. Tay, and M. Leng, “How to identify an infection source
with limited observations,” IEEE Journal of Selected Topics in Signal Processing, vol. 8,
no. 4, pp. 586–597, Aug. 2014
[Matsuta and Uyematsu, 2014] T. Matsuta and T. Uyematsu, “Probability distributions of
the distance between the rumor source and its estimation on regular trees,” SITA 2014,
pp. 605-610, Dec. 2014.
[Prakash et al., 2012] B. A. Prakash, J. Vreeken, and C. Faloutsos, “Spotting culprits in
epidemics: How many and which ones?,” ICDM 2012, pp. 11–20, 10-13 Dec. 2012.
[Shah and Zaman, 2011] D. Shah and T. Zaman, “Rumors in a network: Who’s the
culprit?,” IEEE Trans. Inform. Theory, vol. 57,no. 8, pp. 5163–5181, Aug. 2011.
[Shah and Zaman, 2012] D. Shah and T. Zaman, “Rumor centrality: A universal source
detector,” SIGMETRICS Perform. Eval. Rev., vol. 40, no. 1, pp. 199–210, Jun. 2012.
[Steyn, 1951] H. S. Steyn, “On discrete multivariate probability functions,”
Proc. Koninklijke Nderlandse Akademie van Wetenschappen, Ser. A, vol. 54, pp. 23–30.
[Wang et al., 2014] Z. Wang, W. Dong, and W. Zhang and C.W. Tan, “Rumor source
detection with multiple observations: Fundamental limits and algorithms,” ACM
SIGMETRICS 2014, pp. 1–13, 16-20 June 2014.
[Zhu and Ying, 2013] K. Zhu and L. Ying, “Information source detection in the SIR
model: A sample path based approach,” ITA 2013, pp. 1–9, 10-15 Feb. 2013.
56 / 56