{"id":"https://openalex.org/W4393170806","doi":"https://doi.org/10.1109/jiot.2024.3381281","title":"Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies","display_name":"Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies","publication_year":2024,"publication_date":"2024-03-25","ids":{"openalex":"https://openalex.org/W4393170806","doi":"https://doi.org/10.1109/jiot.2024.3381281"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3381281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3381281","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orca.cardiff.ac.uk/id/eprint/168780/1/Comparative_DQN-Improved_Algorithms_for_Stochastic_Games-Based_Automated_Edge_Intelligence-Enabled_IoT_Malware_Spread-Suppression_Strategies.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021656350","display_name":"Yizhou Shen","orcid":"https://orcid.org/0000-0002-3769-7193"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Yizhou Shen","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065644902","display_name":"Carlton Shepherd","orcid":"https://orcid.org/0000-0002-7366-9034"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Carlton Shepherd","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077409980","display_name":"Chuadhry Mujeeb Ahmed","orcid":"https://orcid.org/0000-0003-3644-0465"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chuadhry Mujeeb Ahmed","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100416489","display_name":"Tingting Li","orcid":"https://orcid.org/0000-0002-9448-1655"},"institutions":[{"id":"https://openalex.org/I79510175","display_name":"Cardiff University","ror":"https://ror.org/03kk7td41","country_code":"GB","type":"education","lineage":["https://openalex.org/I79510175"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tingting Li","raw_affiliation_strings":["School of Computer Science and Informatics, Cardiff University, Cardiff, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Informatics, Cardiff University, Cardiff, U.K","institution_ids":["https://openalex.org/I79510175"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021656350"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":6.4378,"has_fulltext":true,"cited_by_count":18,"citation_normalized_percentile":{"value":0.97358391,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"11","issue":"12","first_page":"22550","last_page":"22561"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8442600965499878},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.674022376537323},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5440035462379456},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4843510389328003},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.41138219833374023},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34875303506851196},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20042148232460022}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8442600965499878},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.674022376537323},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5440035462379456},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4843510389328003},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.41138219833374023},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34875303506851196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20042148232460022}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2024.3381281","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3381281","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:https://orca.cardiff.ac.uk:168780","is_oa":true,"landing_page_url":null,"pdf_url":"https://orca.cardiff.ac.uk/id/eprint/168780/1/Comparative_DQN-Improved_Algorithms_for_Stochastic_Games-Based_Automated_Edge_Intelligence-Enabled_IoT_Malware_Spread-Suppression_Strategies.pdf","source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:https://orca.cardiff.ac.uk:168780","is_oa":true,"landing_page_url":null,"pdf_url":"https://orca.cardiff.ac.uk/id/eprint/168780/1/Comparative_DQN-Improved_Algorithms_for_Stochastic_Games-Based_Automated_Edge_Intelligence-Enabled_IoT_Malware_Spread-Suppression_Strategies.pdf","source":{"id":"https://openalex.org/S4306401195","display_name":"ORCA Online Research @Cardiff (Cardiff University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79510175","host_organization_name":"Cardiff University","host_organization_lineage":["https://openalex.org/I79510175"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7846730872","display_name":null,"funder_award_id":"EP/S018263/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393170806.pdf","grobid_xml":"https://content.openalex.org/works/W4393170806.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W1599086092","https://openalex.org/W1603534221","https://openalex.org/W2027588588","https://openalex.org/W2145339207","https://openalex.org/W2334782222","https://openalex.org/W2746553466","https://openalex.org/W2902215642","https://openalex.org/W2908013787","https://openalex.org/W2962804345","https://openalex.org/W2962834855","https://openalex.org/W2964054038","https://openalex.org/W2964725750","https://openalex.org/W2980750320","https://openalex.org/W2990346675","https://openalex.org/W2991236681","https://openalex.org/W2994249964","https://openalex.org/W2997298686","https://openalex.org/W3006762012","https://openalex.org/W3058760796","https://openalex.org/W3103493968","https://openalex.org/W3107852229","https://openalex.org/W3160546232","https://openalex.org/W3169538914","https://openalex.org/W3198931490","https://openalex.org/W3209536064","https://openalex.org/W3210969948","https://openalex.org/W4221003802","https://openalex.org/W4225550216","https://openalex.org/W4226137608","https://openalex.org/W4280572029","https://openalex.org/W4285105424","https://openalex.org/W4285147178","https://openalex.org/W4285188723","https://openalex.org/W4285293538","https://openalex.org/W4312884727","https://openalex.org/W4321438421","https://openalex.org/W4322627042","https://openalex.org/W4366149343","https://openalex.org/W4366286067","https://openalex.org/W4377079722","https://openalex.org/W4382657634","https://openalex.org/W4383503710","https://openalex.org/W4386090462","https://openalex.org/W4387164705","https://openalex.org/W4387587680","https://openalex.org/W4388905985","https://openalex.org/W4389321138","https://openalex.org/W6637967152","https://openalex.org/W6685444567","https://openalex.org/W6687086880"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W4324372666","https://openalex.org/W2979760315","https://openalex.org/W4225706866","https://openalex.org/W2914646191","https://openalex.org/W4386004629","https://openalex.org/W2942586735"],"abstract_inverted_index":{"Massive":[0],"volumes":[1],"of":[2,13,60,75,125,137,147],"malware":[3,80,113,140],"spread":[4,59],"incidents":[5],"continue":[6],"to":[7,17,32,70,89],"occur":[8],"frequently":[9],"across":[10],"the":[11,58,72,76,86,91,97,110,123,133,145,148],"Internet":[12],"Things":[14],"(IoT).":[15],"Owing":[16],"its":[18],"self-learning":[19],"and":[20,50,81,105],"adaptive":[21],"capability,":[22],"artificial":[23],"intelligence":[24],"(AI)":[25],"can":[26,108],"provide":[27,51],"assistance":[28],"for":[29,56],"automatically":[30],"converging":[31],"an":[33,44],"optimal":[34,111,134],"strategy.":[35],"By":[36],"merging":[37],"AI":[38],"into":[39],"edge":[40,45,82],"computing,":[41],"we":[42,65,95,121],"consider":[43],"intelligence-enabled":[46],"IoT":[47,61,79],"(EIIoT)":[48],"environment":[49],"a":[52],"stochastic":[53,67],"learning":[54,129],"strategy":[55,115,130],"suppressing":[57],"malware.":[62],"In":[63],"particular,":[64],"introduce":[66],"game":[68],"theory":[69],"symbolise":[71],"whole":[73],"process":[74],"confrontation":[77],"between":[78],"nodes.":[83],"Built":[84],"upon":[85],"theoretical":[87],"framework":[88],"demonstrate":[90],"specific":[92],"spread-suppression":[93,114],"architecture,":[94],"apply":[96],"improved":[98],"Deep":[99],"Q-Network":[100],"algorithms":[101],"including":[102],"DDQMS,":[103],"D2QMS":[104],"D3QMS":[106],"that":[107],"deduce":[109],"EIIoT":[112,139],"with":[116],"better":[117],"performance.":[118],"Through":[119],"experiments,":[120],"investigate":[122],"influence":[124],"related":[126],"parameters":[127,135],"on":[128],"selection,":[131],"recommending":[132],"setting":[136],"automated":[138],"spread-suppression.":[141],"We":[142],"also":[143],"compare":[144],"performance":[146],"proposed":[149],"three":[150],"DQN-improved":[151],"algorithms.":[152]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
