{"id":"https://openalex.org/W2066539609","doi":"https://doi.org/10.1108/13287260480000779","title":"Artificial hygiene: Non\u2010proliferation of viruses in cellular networks","display_name":"Artificial hygiene: Non\u2010proliferation of viruses in cellular networks","publication_year":2004,"publication_date":"2004-06-01","ids":{"openalex":"https://openalex.org/W2066539609","doi":"https://doi.org/10.1108/13287260480000779","mag":"2066539609"},"language":"en","primary_location":{"id":"doi:10.1108/13287260480000779","is_oa":false,"landing_page_url":"https://doi.org/10.1108/13287260480000779","pdf_url":null,"source":{"id":"https://openalex.org/S39868070","display_name":"Journal of Systems and Information Technology","issn_l":"1328-7265","issn":["1328-7265","1758-8847"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Information Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083614124","display_name":"Asoke K. Talukder","orcid":null},"institutions":[{"id":"https://openalex.org/I4210090154","display_name":"Daimler (United Kingdom)","ror":"https://ror.org/00ac5t267","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210090154","https://openalex.org/I891521709"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Asoke K Talukder","raw_affiliation_strings":["DaimlerChrysler Chair, Indian Institute of Information Technology. Bangalore","(DaimlerChrysler Chair, Indian Institute of Information Technology. Bangalore)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"DaimlerChrysler Chair, Indian Institute of Information Technology. Bangalore","institution_ids":["https://openalex.org/I4210090154"]},{"raw_affiliation_string":"(DaimlerChrysler Chair, Indian Institute of Information Technology. Bangalore)","institution_ids":["https://openalex.org/I4210090154"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031374866","display_name":"Debabrata Das","orcid":"https://orcid.org/0000-0002-7042-4824"},"institutions":[{"id":"https://openalex.org/I1324840837","display_name":"Hewlett-Packard (United States)","ror":"https://ror.org/059rn9488","country_code":"US","type":"company","lineage":["https://openalex.org/I1324840837"]},{"id":"https://openalex.org/I26072440","display_name":"Indian Institute of Information Technology Allahabad","ror":"https://ror.org/03rgjt374","country_code":"IN","type":"education","lineage":["https://openalex.org/I26072440"]}],"countries":["IN","US"],"is_corresponding":false,"raw_author_name":"Debabrata Das","raw_affiliation_strings":["Hewlett Packard Chair, Indian Institute of Information Technology, Bangalore","(Hewlett Packard Chair, Indian Institute of Information Technology, Bangalore)"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Hewlett Packard Chair, Indian Institute of Information Technology, Bangalore","institution_ids":["https://openalex.org/I1324840837","https://openalex.org/I26072440"]},{"raw_affiliation_string":"(Hewlett Packard Chair, Indian Institute of Information Technology, Bangalore)","institution_ids":["https://openalex.org/I1324840837","https://openalex.org/I26072440"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5083614124"],"corresponding_institution_ids":["https://openalex.org/I4210090154"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.16441795,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":"1/2","first_page":"10","last_page":"22"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6131634712219238},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6089120507240295},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.6001668572425842},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.5922079086303711},{"id":"https://openalex.org/keywords/trojan","display_name":"Trojan","score":0.5186254382133484},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5162749290466309},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4282014071941376},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.42788130044937134},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.37502002716064453},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3334943354129791},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.324199914932251},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.10795637965202332}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6131634712219238},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6089120507240295},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.6001668572425842},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.5922079086303711},{"id":"https://openalex.org/C174333608","wikidata":"https://www.wikidata.org/wiki/Q19635","display_name":"Trojan","level":2,"score":0.5186254382133484},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5162749290466309},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4282014071941376},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.42788130044937134},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.37502002716064453},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3334943354129791},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.324199914932251},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.10795637965202332},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/13287260480000779","is_oa":false,"landing_page_url":"https://doi.org/10.1108/13287260480000779","pdf_url":null,"source":{"id":"https://openalex.org/S39868070","display_name":"Journal of Systems and Information Technology","issn_l":"1328-7265","issn":["1328-7265","1758-8847"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Systems and Information Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W42722137","https://openalex.org/W1562862894","https://openalex.org/W1653851611","https://openalex.org/W1781758015","https://openalex.org/W1981589225","https://openalex.org/W2028521236","https://openalex.org/W2038195874","https://openalex.org/W2069240447","https://openalex.org/W2110919848","https://openalex.org/W2137038953","https://openalex.org/W2153692272","https://openalex.org/W2163242592","https://openalex.org/W2499586571","https://openalex.org/W2544764177","https://openalex.org/W4210598169"],"related_works":["https://openalex.org/W4253721122","https://openalex.org/W1671033612","https://openalex.org/W4389527383","https://openalex.org/W4206524843","https://openalex.org/W4220926637","https://openalex.org/W2139923244","https://openalex.org/W2362681120","https://openalex.org/W2237899707","https://openalex.org/W2376320007","https://openalex.org/W576137284"],"abstract_inverted_index":{"Viruses,":[0],"worms,":[1],"Trojan":[2],"horses,":[3],"spywares":[4],"have":[5,78,122,198],"been":[6,123],"effective":[7,117],"for":[8,118,153],"quite":[9],"sometime":[10],"in":[11,26,92,100,108,129,156,167,203],"the":[12,50,54,58,64,69,76,84,109,130,136,168,172,196,218,227,231,236],"domain":[13,52],"of":[14,22,24,53,60,68,87,126,138],"digital":[15,94,237],"computers.":[16],"These":[17,45],"malicious":[18],"software":[19,113],"cause":[20],"millions":[21],"dollars":[23],"loss":[25],"assets,":[27],"revenue,":[28],"opportunity,":[29],"cleanup":[30],"cost,":[31],"and":[32,63,151,214,226],"lost":[33],"productivity.":[34],"To":[35],"stop":[36],"virus":[37,182,212],"attacks,":[38],"organizations":[39],"frame":[40],"up":[41],"different":[42],"security":[43,85],"policies.":[44],"policies":[46,86],"work":[47,216],"only":[48],"within":[49],"limited":[51],"organization\u2019s":[55],"network.":[56,90,111],"However,":[57,134],"emergence":[59,137],"wireless":[61,70],"technologies,":[62],"seamless":[65],"mobility":[66],"features":[67],"devices":[71,98,155],"from":[72],"one":[73],"network":[74,205,228],"to":[75,82,148,163,175,181,190,234],"other":[77],"created":[79],"a":[80,88,200,224],"challenge":[81],"uphold":[83],"particular":[89],"Hence,":[91],"this":[93,187,194,222],"society,":[95],"while":[96],"mobile":[97,142,154],"roam":[99],"foreign":[101,110],"networks,":[102],"they":[103],"get":[104],"infected":[105],"through":[106],"viruses":[107,128,150,166,178],"Anti\u2010virus":[112],"is":[114,211],"not":[115],"so":[116],"novel":[119,201],"viruses.":[120],"There":[121],"no":[124],"reports":[125],"mobile\u2010phone":[127],"wild":[131],"as":[132],"yet.":[133],"with":[135],"execution":[139],"environments":[140],"on":[141],"phones,":[143],"it":[144],"will":[145,215,229],"be":[146,161,191],"possible":[147],"write":[149],"worms":[152],"cellular":[157,169,204],"networks.":[158,170],"We":[159,184],"should":[160],"prepared":[162],"fight":[164,176,188],"against":[165,177],"All":[171],"technologies":[173],"available":[174],"are":[179],"specific":[180],"signatures.":[183],"propose":[185],"that":[186],"needs":[189],"multilayered.":[192],"In":[193],"paper":[195],"authors":[197],"proposed":[199],"philosophy":[202],"called":[206],"Artificial":[207],"Hygiene":[208],"(AH),":[209],"which":[210],"neutral":[213],"at":[217],"class":[219],"level.":[220],"With":[221],"process":[223],"device":[225],"take":[230],"necessary":[232],"steps":[233],"keep":[235],"environment":[238],"safe.":[239]},"counts_by_year":[],"updated_date":"2026-05-21T06:26:12.895304","created_date":"2025-10-10T00:00:00"}
