{"id":"https://openalex.org/W2029020753","doi":"https://doi.org/10.1109/grc.2012.6468634","title":"A novel model to restrain email virus propagation","display_name":"A novel model to restrain email virus propagation","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2029020753","doi":"https://doi.org/10.1109/grc.2012.6468634","mag":"2029020753"},"language":"en","primary_location":{"id":"doi:10.1109/grc.2012.6468634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/grc.2012.6468634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Granular Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100430705","display_name":"Yanping Zhang","orcid":"https://orcid.org/0000-0002-5678-3038"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanping Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Anhui University, Hefei, Anhui Province, P.R. China","School of Computer Science and Technology,Anhui University,Hefei 230039,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei, Anhui Province, P.R. China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology,Anhui University,Hefei 230039,China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101504588","display_name":"Tingting Sun","orcid":"https://orcid.org/0000-0003-1388-3458"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tingting Sun","raw_affiliation_strings":["School of Computer Science and Technology, Anhui University, Hefei, Anhui Province, P.R. China","School of Computer Science and Technology,Anhui University,Hefei 230039,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei, Anhui Province, P.R. China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology,Anhui University,Hefei 230039,China","institution_ids":["https://openalex.org/I143868143"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100661274","display_name":"Shu Zhao","orcid":"https://orcid.org/0000-0001-7647-3603"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shu Zhao","raw_affiliation_strings":["School of Computer Science and Technology, Anhui University, Hefei, Anhui Province, P.R. China","School of Computer Science and Technology,Anhui University,Hefei 230039,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Anhui University, Hefei, Anhui Province, P.R. China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"School of Computer Science and Technology,Anhui University,Hefei 230039,China","institution_ids":["https://openalex.org/I143868143"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100430705"],"corresponding_institution_ids":["https://openalex.org/I143868143"],"apc_list":null,"apc_paid":null,"fwci":0.3546,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.61985263,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"645","last_page":"650"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6756659746170044},{"id":"https://openalex.org/keywords/computer-virus","display_name":"Computer virus","score":0.5817031860351562},{"id":"https://openalex.org/keywords/virus","display_name":"Virus","score":0.5607706308364868},{"id":"https://openalex.org/keywords/propagation-delay","display_name":"Propagation delay","score":0.47057172656059265},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.28287187218666077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23941463232040405},{"id":"https://openalex.org/keywords/virology","display_name":"Virology","score":0.1629563868045807},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.08977517485618591}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6756659746170044},{"id":"https://openalex.org/C19407854","wikidata":"https://www.wikidata.org/wiki/Q485","display_name":"Computer virus","level":2,"score":0.5817031860351562},{"id":"https://openalex.org/C2522874641","wikidata":"https://www.wikidata.org/wiki/Q808","display_name":"Virus","level":2,"score":0.5607706308364868},{"id":"https://openalex.org/C90806461","wikidata":"https://www.wikidata.org/wiki/Q1144416","display_name":"Propagation delay","level":2,"score":0.47057172656059265},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.28287187218666077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23941463232040405},{"id":"https://openalex.org/C159047783","wikidata":"https://www.wikidata.org/wiki/Q7215","display_name":"Virology","level":1,"score":0.1629563868045807},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.08977517485618591}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/grc.2012.6468634","is_oa":false,"landing_page_url":"https://doi.org/10.1109/grc.2012.6468634","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Granular Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1550151555","https://openalex.org/W1969723574","https://openalex.org/W1971421925","https://openalex.org/W1979384126","https://openalex.org/W1981589225","https://openalex.org/W1996685017","https://openalex.org/W2037881439","https://openalex.org/W2038195874","https://openalex.org/W2078069521","https://openalex.org/W2100734403","https://openalex.org/W2102656516","https://openalex.org/W2105498167","https://openalex.org/W2139786655","https://openalex.org/W2171711861","https://openalex.org/W3151237455","https://openalex.org/W6645660338","https://openalex.org/W6675145610","https://openalex.org/W6675762620"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2356039636"],"abstract_inverted_index":{"Email":[0],"is":[1,67,81,114],"one":[2],"of":[3,24,52,86,106,111],"the":[4,27,48,84,104,109],"most":[5],"frequent":[6],"communication":[7],"mediums":[8],"in":[9,92],"real":[10],"life.":[11],"Simultaneously,":[12],"virus":[13,29,54,107,130],"propagation":[14,30,57,105,131],"attaching":[15],"to":[16,128],"email":[17,28,53],"has":[18],"appeared,":[19],"and":[20,50,61,77,108],"caused":[21],"a":[22,37,43,70,125],"series":[23],"losses.":[25],"However,":[26],"was":[31,40],"effected":[32],"by":[33,132],"many":[34],"factors.":[35],"Therefore,":[36],"reliable":[38,126],"model":[39,66,101],"considered":[41],"as":[42],"challenging":[44],"problem.":[45],"By":[46],"analyzing":[47],"ways":[49],"characters":[51],"propagation.an":[55],"improved":[56],"model,":[58],"namely,":[59],"Anti-virus":[60],"Trust":[62],"level":[63,80,134],"Healthy-Danger-Infected":[64],"(ATHDI)":[65],"proposed.":[68],"Besides,":[69,121],"novel":[71],"algorithm":[72],"based":[73,117],"on":[74,89,118],"anti-virus":[75],"ability":[76],"users'":[78],"trust":[79,133],"presented.":[82],"compares":[83],"effect":[85],"important":[87],"factors":[88],"infected":[90,112],"individuals":[91,113],"different":[93],"networks.":[94],"The":[95],"simulation":[96],"experiments":[97],"show":[98],"that":[99],"proposed":[100,119],"describes":[102],"accurately":[103],"number":[110],"very":[115],"low":[116],"model.":[120],"this":[122],"work":[123],"provides":[124],"method":[127],"restrain":[129],"among":[135],"users.":[136]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
