{"id":"https://openalex.org/W4386088211","doi":"https://doi.org/10.1109/jiot.2023.3295016","title":"Modeling and Analyzing the Spatial\u2013Temporal Propagation of Malware in Mobile Wearable IoT Networks","display_name":"Modeling and Analyzing the Spatial\u2013Temporal Propagation of Malware in Mobile Wearable IoT Networks","publication_year":2023,"publication_date":"2023-08-23","ids":{"openalex":"https://openalex.org/W4386088211","doi":"https://doi.org/10.1109/jiot.2023.3295016"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3295016","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3295016","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012218318","display_name":"Jie Dou","orcid":"https://orcid.org/0000-0002-9287-1713"},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jie Dou","raw_affiliation_strings":["College of Electronic Information and Optical engineering, Taiyuan University of Technology, Taiyuan, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic Information and Optical engineering, Taiyuan University of Technology, Taiyuan, China","institution_ids":["https://openalex.org/I9086337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042609299","display_name":"Gang Xie","orcid":"https://orcid.org/0000-0001-5769-0565"},"institutions":[{"id":"https://openalex.org/I9086337","display_name":"Taiyuan University of Technology","ror":"https://ror.org/03kv08d37","country_code":"CN","type":"education","lineage":["https://openalex.org/I9086337"]},{"id":"https://openalex.org/I46305995","display_name":"Taiyuan University of Science and Technology","ror":"https://ror.org/01wcbdc92","country_code":"CN","type":"education","lineage":["https://openalex.org/I46305995"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xie","raw_affiliation_strings":["College of Electrical and Power Engineering, Taiyuan University of Technology, Taiyuan, China","Shanxi Key Laboratory of Advanced Control and Equipment Intelligence, Taiyuan University of Science and Technology, Taiyuan, China"],"affiliations":[{"raw_affiliation_string":"College of Electrical and Power Engineering, Taiyuan University of Technology, Taiyuan, China","institution_ids":["https://openalex.org/I9086337"]},{"raw_affiliation_string":"Shanxi Key Laboratory of Advanced Control and Equipment Intelligence, Taiyuan University of Science and Technology, Taiyuan, China","institution_ids":["https://openalex.org/I46305995"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059567156","display_name":"Zhiyi Tian","orcid":"https://orcid.org/0000-0001-8905-0941"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhiyi Tian","raw_affiliation_strings":["School of Software, University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026963407","display_name":"Lei Cui","orcid":null},"institutions":[{"id":"https://openalex.org/I4210158984","display_name":"National Supercomputing Center in Wuxi","ror":"https://ror.org/04ypjrs34","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210158984"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Cui","raw_affiliation_strings":["National Supercomputer Center in Jinan, Shandong Computer Science Center, Jinan, China"],"affiliations":[{"raw_affiliation_string":"National Supercomputer Center in Jinan, Shandong Computer Science Center, Jinan, China","institution_ids":["https://openalex.org/I4210158984"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Software, University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5012218318"],"corresponding_institution_ids":["https://openalex.org/I9086337"],"apc_list":null,"apc_paid":null,"fwci":2.8087,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91102441,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"11","issue":"2","first_page":"2438","last_page":"2452"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8165931105613708},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.7422007918357849},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7170339226722717},{"id":"https://openalex.org/keywords/mobility-model","display_name":"Mobility model","score":0.6416526436805725},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.6143829226493835},{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.5162596702575684},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.463908851146698},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37052029371261597},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3299860954284668},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32925355434417725},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.30164843797683716},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.15972810983657837}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8165931105613708},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.7422007918357849},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7170339226722717},{"id":"https://openalex.org/C191485582","wikidata":"https://www.wikidata.org/wiki/Q6887309","display_name":"Mobility model","level":2,"score":0.6416526436805725},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.6143829226493835},{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.5162596702575684},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.463908851146698},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37052029371261597},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3299860954284668},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32925355434417725},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.30164843797683716},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.15972810983657837},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3295016","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3295016","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G6546179905","display_name":null,"funder_award_id":"201901D211306","funder_id":"https://openalex.org/F4320326179","funder_display_name":"Shanxi Province Science Foundation for Youths"},{"id":"https://openalex.org/G8714964239","display_name":null,"funder_award_id":"202102020101002","funder_id":"https://openalex.org/F4320336035","funder_display_name":"Shanxi Provincial Key Research and Development Project"}],"funders":[{"id":"https://openalex.org/F4320326179","display_name":"Shanxi Province Science Foundation for Youths","ror":null},{"id":"https://openalex.org/F4320336035","display_name":"Shanxi Provincial Key Research and Development Project","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1497763074","https://openalex.org/W1985050589","https://openalex.org/W1998885083","https://openalex.org/W2057423239","https://openalex.org/W2073457560","https://openalex.org/W2100734403","https://openalex.org/W2108704847","https://openalex.org/W2133286823","https://openalex.org/W2138285393","https://openalex.org/W2138677604","https://openalex.org/W2157457404","https://openalex.org/W2263008129","https://openalex.org/W2474253221","https://openalex.org/W2476629869","https://openalex.org/W2485176934","https://openalex.org/W2556028656","https://openalex.org/W2564813630","https://openalex.org/W2572026813","https://openalex.org/W2596636257","https://openalex.org/W2615659924","https://openalex.org/W2740884108","https://openalex.org/W2816505892","https://openalex.org/W2895429161","https://openalex.org/W2897514040","https://openalex.org/W2904394492","https://openalex.org/W2906719522","https://openalex.org/W2909545524","https://openalex.org/W2936508005","https://openalex.org/W2966031774","https://openalex.org/W2968774960","https://openalex.org/W2991184444","https://openalex.org/W2995324964","https://openalex.org/W2999472659","https://openalex.org/W3008400047","https://openalex.org/W3022844159","https://openalex.org/W3027515711","https://openalex.org/W3048592926","https://openalex.org/W3048999977","https://openalex.org/W3092077023","https://openalex.org/W3099414328","https://openalex.org/W3103528139","https://openalex.org/W3107519623","https://openalex.org/W3160546232","https://openalex.org/W3165330723","https://openalex.org/W3182125009","https://openalex.org/W3207611229","https://openalex.org/W4250133251"],"related_works":["https://openalex.org/W2294483539","https://openalex.org/W2378449000","https://openalex.org/W3187581118","https://openalex.org/W2938399969","https://openalex.org/W2616994865","https://openalex.org/W3143747655","https://openalex.org/W2002178493","https://openalex.org/W2901835651","https://openalex.org/W2929621094","https://openalex.org/W1996006176"],"abstract_inverted_index":{"Wearable":[0],"Internet":[1],"of":[2,49,79,93,108,135,144,166,169,176,196,202],"Things":[3],"(IoT)":[4],"devices":[5,27,74,113,147],"are":[6],"easily":[7],"compromised":[8],"by":[9,19],"malware":[10,20,60,94,242,254],"due":[11],"to":[12,23,46,56,75,130,161,239,250],"their":[13],"security":[14],"vulnerabilities.":[15],"The":[16],"bots":[17,39,170],"infected":[18],"may":[21],"continue":[22],"infect":[24],"healthy":[25],"neighbor":[26],"through":[28],"wireless":[29],"communication":[30],"technology":[31],"in":[32,114],"mobile":[33,136],"wearable":[34,64,112,146],"IoT":[35],"networks":[36],"(WIoT).":[37],"All":[38],"form":[40],"a":[41,47,120,246],"botnet":[42,203],"which":[43,66],"eventually":[44],"leads":[45],"series":[48],"malicious":[50],"attacks.":[51],"Therefore,":[52],"it":[53],"is":[54,217,231],"necessary":[55],"predict":[57],"the":[58,77,86,96,106,115,132,141,150,156,163,167,172,184,194,200,214,227,235,241,252],"dynamic":[59],"propagation":[61,91,159,181,243],"path":[62],"between":[63],"devices,":[65],"can":[67],"help":[68],"provide":[69],"target":[70],"immunization":[71],"measures":[72],"on":[73,140,199],"prevent":[76],"formation":[78,204],"botnets.":[80],"In":[81,225],"this":[82],"article,":[83],"we":[84,118,154],"capture":[85],"local":[87],"interaction":[88],"and":[89,171,188,192,244],"spatial\u2013temporal":[90],"behavior":[92],"utilizing":[95],"individual-based":[97],"cellular":[98],"automata":[99],"(CA)":[100],"model.":[101],"First,":[102],"taking":[103],"into":[104],"account":[105],"mobility":[107,122,152,223],"walking":[109],"users":[110],"carrying":[111],"actual":[116],"WIoT,":[117],"present":[119],"human":[121,222],"model":[123,160,182,187,216,230,238],"called":[124],"Gauss\u2013Markov":[125],"truncated":[126],"Levy":[127],"walk":[128],"(GM-TLW)":[129],"describe":[131],"movement":[133],"patterns":[134],"users.":[137],"Second,":[138],"based":[139],"moving":[142],"coordinates":[143],"all":[145],"obtained":[148],"from":[149],"GM-TLW":[151,215],"model,":[153,191],"leverage":[155],"improved":[157],"CA":[158,190],"study":[162],"time":[164],"evolution":[165],"number":[168],"spreading":[173],"spatial":[174],"distribution":[175],"malware.":[177],"We":[178],"compare":[179],"our":[180],"with":[183],"differential":[185,236],"equation":[186,237],"traditional":[189],"analyze":[193],"impact":[195],"various":[197],"parameters":[198],"dynamics":[201],"using":[205],"numerical":[206],"simulations.":[207],"Finally,":[208],"detailed":[209],"simulation":[210],"results":[211],"show":[212],"that":[213],"more":[218,232],"suitable":[219],"for":[220,248],"realistic":[221],"scenarios.":[224],"addition,":[226],"proposed":[228],"CA-based":[229],"precise":[233],"than":[234],"modeling":[240],"provides":[245],"basis":[247],"defenders":[249],"adopt":[251],"optimal":[253],"control":[255],"strategies.":[256]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
