{"id":"https://openalex.org/W3002766903","doi":"https://doi.org/10.1109/access.2020.2968916","title":"Dynamical Propagation Model of Malware for Cloud Computing Security","display_name":"Dynamical Propagation Model of Malware for Cloud Computing Security","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3002766903","doi":"https://doi.org/10.1109/access.2020.2968916","mag":"3002766903"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2968916","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08967081.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08967081.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042295346","display_name":"Chenquan Gan","orcid":"https://orcid.org/0000-0002-0453-5630"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"funder","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenquan Gan","raw_affiliation_strings":["School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004581488","display_name":"Qingdong Feng","orcid":"https://orcid.org/0000-0003-4046-489X"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"funder","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingdong Feng","raw_affiliation_strings":["School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101592232","display_name":"Xulong Zhang","orcid":"https://orcid.org/0000-0002-9252-7146"},"institutions":[{"id":"https://openalex.org/I5422934","display_name":"Shanxi Datong University","ror":"https://ror.org/03s8xc553","country_code":"CN","type":"funder","lineage":["https://openalex.org/I5422934"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xulong Zhang","raw_affiliation_strings":["School of Computer and Network Engineering, Shanxi Datong University, Datong, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Network Engineering, Shanxi Datong University, Datong, China","institution_ids":["https://openalex.org/I5422934"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078332129","display_name":"Zufan Zhang","orcid":"https://orcid.org/0000-0001-5315-2065"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"funder","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zufan Zhang","raw_affiliation_strings":["School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065959325","display_name":"Qingyi Zhu","orcid":"https://orcid.org/0000-0002-1168-1599"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"funder","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingyi Zhu","raw_affiliation_strings":["School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, China","institution_ids":["https://openalex.org/I10535382"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.552,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":30,"citation_normalized_percentile":{"value":0.999948,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"8","issue":null,"first_page":"20325","last_page":"20333"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9935,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.41749275}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.79383564},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7912473},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.77491045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.514134},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.49561107},{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.41749275},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3273707},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17777881}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2968916","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08967081.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/eff040d7554e4aa584885000ea613505","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2968916","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08967081.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.62,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61903056"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702066"},{"funder":"https://openalex.org/F4320327865","funder_display_name":"Chongqing Research Program of Basic Research and Frontier Technology","award_id":"cstc2017jcyjAX0256"},{"funder":"https://openalex.org/F4320327865","funder_display_name":"Chongqing Research Program of Basic Research and Frontier Technology","award_id":"cstc2019jcyj-msxmX0681"},{"funder":"https://openalex.org/F4320327865","funder_display_name":"Chongqing Research Program of Basic Research and Frontier Technology","award_id":"cstc2018jcyjAX0154"}],"datasets":[],"versions":[],"referenced_works_count":29,"referenced_works":["https://openalex.org/W1188098084","https://openalex.org/W1548708049","https://openalex.org/W1973288976","https://openalex.org/W1974715634","https://openalex.org/W2028822063","https://openalex.org/W2031175798","https://openalex.org/W2040428201","https://openalex.org/W2048001636","https://openalex.org/W2051604209","https://openalex.org/W2104348420","https://openalex.org/W2109921293","https://openalex.org/W2125212367","https://openalex.org/W2238703847","https://openalex.org/W2280094791","https://openalex.org/W2329110733","https://openalex.org/W2406018508","https://openalex.org/W2410938517","https://openalex.org/W2475348579","https://openalex.org/W2526830364","https://openalex.org/W2588330679","https://openalex.org/W2770198223","https://openalex.org/W2786991412","https://openalex.org/W2884539532","https://openalex.org/W2908569165","https://openalex.org/W2910142630","https://openalex.org/W2917006683","https://openalex.org/W2954613285","https://openalex.org/W2954653574","https://openalex.org/W354363643"],"related_works":["https://openalex.org/W4401658540","https://openalex.org/W4205234238","https://openalex.org/W3167767780","https://openalex.org/W3148880067","https://openalex.org/W3142266060","https://openalex.org/W3043682580","https://openalex.org/W2941559775","https://openalex.org/W2931996793","https://openalex.org/W2788934790","https://openalex.org/W1988660452"],"abstract_inverted_index":{"Cloud-fog-edge":[0],"computing":[1,4,36,43],"especially":[2,105],"cloud":[3,35,61,145],"is":[5,28,62,70,93,123,133],"providing":[6],"a":[7,19,84,89,117],"variety":[8],"of":[9,30,34,42,48,67,75,103,108,127,140,159],"services":[10],"in":[11,22,59,112],"many":[12],"areas":[13],"around":[14],"the":[15,39,46,56,60,73,81,97,101,106,137,155,160],"world":[16],"and":[17,37,157],"plays":[18],"vital":[20],"role":[21],"cyber-physical-social":[23],"systems":[24],"(CPSS).":[25],"Particularly,":[26],"virtualization":[27],"one":[29],"main":[31],"enabling":[32],"technologies":[33],"realizes":[38],"dynamic":[40],"deployment":[41],"tasks":[44],"through":[45],"migration":[47],"virtual":[49,57],"machines":[50],"(VMs),":[51],"so":[52],"how":[53],"to":[54,71,95,135,153],"secure":[55],"environment":[58],"very":[63],"crucial.":[64],"The":[65],"purpose":[66],"this":[68,115,121],"paper":[69],"address":[72],"issue":[74],"malware":[76,141],"propagation":[77,91],"among":[78],"VMs":[79],"under":[80,142],"infrastructure":[82],"as":[83],"service":[85],"(IaaS)":[86],"architecture.":[87],"Firstly,":[88],"dynamical":[90],"model":[92,122],"proposed":[94,161],"explore":[96],"important":[98],"factors":[99],"affecting":[100],"spread":[102],"malware,":[104],"impact":[107],"installing":[109],"antivirus":[110],"software":[111],"VMs.":[113],"On":[114],"basis,":[116],"theoretical":[118],"analysis":[119],"for":[120],"investigated":[124],"by":[125],"means":[126],"differential":[128],"dynamics,":[129],"from":[130],"which":[131],"it":[132],"able":[134],"understand":[136],"dissemination":[138],"behavior":[139],"an":[143],"infected":[144],"environment.":[146],"Finally,":[147],"some":[148],"numerical":[149],"simulations":[150],"are":[151],"conducted":[152],"verify":[154],"applicability":[156],"effectiveness":[158],"model.":[162]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3002766903","counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5}],"updated_date":"2025-04-28T14:38:41.744244","created_date":"2020-01-30"}