{"id":"https://openalex.org/W3015015459","doi":"https://doi.org/10.1109/access.2020.2984668","title":"Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things","display_name":"Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3015015459","doi":"https://doi.org/10.1109/access.2020.2984668","mag":"3015015459"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2984668","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09051715.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09051715.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100360971","display_name":"Li Li","orcid":"https://orcid.org/0000-0001-5512-6629"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000975190","display_name":"Ju-fu Cui","orcid":"https://orcid.org/0000-0002-7146-0624"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jufu Cui","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422044","display_name":"Rui Zhang","orcid":"https://orcid.org/0000-0002-4117-2656"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rui Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080791772","display_name":"Hui Xia","orcid":"https://orcid.org/0000-0001-7326-5796"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Xia","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074344368","display_name":"Xiangguo Cheng","orcid":"https://orcid.org/0000-0002-1228-4894"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangguo Cheng","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.149,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":11,"citation_normalized_percentile":{"value":0.771618,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":86,"max":87},"biblio":{"volume":"8","issue":null,"first_page":"64184","last_page":"64192"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9918,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.6154732}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8496902},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75313914},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.6154732},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5811645},{"id":"https://openalex.org/C101780184","wikidata":"https://www.wikidata.org/wiki/Q840576","display_name":"Dissemination","level":2,"score":0.56336105},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4309199},{"id":"https://openalex.org/C69738355","wikidata":"https://www.wikidata.org/wiki/Q1228929","display_name":"Linear discriminant analysis","level":2,"score":0.41681218},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.38384676},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.37894267},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37457353},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35180414},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.293396},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20027098},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15711033},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11575934},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2984668","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09051715.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/b137c88e66614702922529432a9658dd","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2984668","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09051715.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.69,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61872205"},{"funder":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province","award_id":"ZR2019MF018"}],"datasets":[],"versions":[],"referenced_works_count":32,"referenced_works":["https://openalex.org/W1519581288","https://openalex.org/W2124486211","https://openalex.org/W2146591355","https://openalex.org/W2169239645","https://openalex.org/W2293247967","https://openalex.org/W2294937515","https://openalex.org/W2526910689","https://openalex.org/W2543927648","https://openalex.org/W2614230424","https://openalex.org/W2751913761","https://openalex.org/W2759315193","https://openalex.org/W2765509587","https://openalex.org/W2785022326","https://openalex.org/W2794086975","https://openalex.org/W2800806089","https://openalex.org/W2804422987","https://openalex.org/W2906719522","https://openalex.org/W2908710503","https://openalex.org/W2921010908","https://openalex.org/W2936436865","https://openalex.org/W2943086164","https://openalex.org/W2950908309","https://openalex.org/W2953034770","https://openalex.org/W2954613285","https://openalex.org/W2966031774","https://openalex.org/W2968999477","https://openalex.org/W2974839084","https://openalex.org/W2982407593","https://openalex.org/W3001393655","https://openalex.org/W3010248974","https://openalex.org/W3099414328","https://openalex.org/W564951312"],"related_works":["https://openalex.org/W4407174304","https://openalex.org/W4248517311","https://openalex.org/W2993833576","https://openalex.org/W2772446090","https://openalex.org/W2753240997","https://openalex.org/W2740895074","https://openalex.org/W2537959205","https://openalex.org/W2374084962","https://openalex.org/W2097492617","https://openalex.org/W1764168690"],"abstract_inverted_index":{"While":[0],"cyber":[1],"physics":[2],"system":[3],"(CPS)":[4],"provides":[5],"forward-looking":[6],"and":[7,30,48,97,114,131,157],"personalized":[8],"services":[9],"for":[10,16,24],"users,":[11],"it":[12],"also":[13],"creates":[14],"conditions":[15],"the":[17,32,38,41,70,80,101,109,115,127,145],"spread":[18],"of":[19,35,40,43,72,112,134,147],"malware.":[20,36],"Therefore,":[21],"it's":[22],"critical":[23],"us":[25],"to":[26,69,107,124,143],"analyse":[27],"affecting":[28],"factors":[29,116],"study":[31],"propagation":[33,54,129],"characteristics":[34,111],"On":[37],"basis":[39],"difference":[42],"intelligent":[44,61,87,153],"device's":[45,88,154],"dissemination":[46,73,155],"capacity":[47,156],"discriminant":[49,89,158],"ability,":[50],"a":[51],"dynamic":[52,110],"malware":[53,119,128,164],"model":[55],"(Disseminate&Discriminate-Spread-Exposed-Ignorant-Recover,":[56],"DDSEIR)":[57],"is":[58,105,122],"proposed.":[59],"First,":[60],"devices":[62],"are":[63],"classified":[64],"into":[65,83],"different":[66],"groups":[67],"according":[68],"level":[71],"capability":[74],"by":[75,94],"hierarchical":[76],"mechanism,":[77],"which":[78,121],"takes":[79],"networks":[81],"topology":[82],"account.":[84],"And":[85],"subsequently,":[86],"ability":[90,159],"can":[91],"be":[92],"evaluated":[93],"sender's":[95],"identity":[96],"information":[98],"attributes.":[99],"Then,":[100],"mean":[102],"field":[103],"equation":[104],"constructed":[106],"analyze":[108],"DDSEIR":[113],"that":[117,152],"influence":[118],"propagation,":[120],"used":[123],"further":[125],"derive":[126],"scale":[130],"threshold":[132],"value":[133],"diffusion.":[135],"Finally,":[136],"this":[137],"paper":[138],"uses":[139],"Live":[140],"Journal":[141],"dataset":[142],"verify":[144],"effectiveness":[146],"DDSEIR.":[148],"The":[149],"experiments":[150],"illustrate":[151],"have":[160],"significant":[161],"influences":[162],"on":[163],"propagation.":[165]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3015015459","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":3}],"updated_date":"2025-04-15T20:18:54.155836","created_date":"2020-04-10"}