{"id":"https://openalex.org/W2567548815","doi":"https://doi.org/10.1109/milcom.2016.7795377","title":"Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning","display_name":"Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2567548815","doi":"https://doi.org/10.1109/milcom.2016.7795377","mag":"2567548815"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2016.7795377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063120551","display_name":"James Morris-King","orcid":null},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"James R. Morris-King","raw_affiliation_strings":["Army Research Lab, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"Army Research Lab, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002845585","display_name":"Hasan \u00c7am","orcid":"https://orcid.org/0000-0002-3531-7003"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hasan Cam","raw_affiliation_strings":["Army Research Lab, Adelphi, MD, USA"],"affiliations":[{"raw_affiliation_string":"Army Research Lab, Adelphi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063120551"],"corresponding_institution_ids":["https://openalex.org/I166416128"],"apc_list":null,"apc_paid":null,"fwci":0.5791,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.73849279,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9018881320953369},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7972378730773926},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.694953203201294},{"id":"https://openalex.org/keywords/mobile-malware","display_name":"Mobile malware","score":0.5970050692558289},{"id":"https://openalex.org/keywords/pruning","display_name":"Pruning","score":0.534249484539032},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.5333079695701599},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5242969393730164},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5186659097671509},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5082730650901794},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.49123328924179077},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4855008125305176},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4758153557777405},{"id":"https://openalex.org/keywords/cellular-network","display_name":"Cellular network","score":0.47544217109680176},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4381113052368164},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4201244115829468},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3602052927017212},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.26579582691192627},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1709648072719574},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11028197407722473},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09598788619041443}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9018881320953369},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7972378730773926},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.694953203201294},{"id":"https://openalex.org/C2780967490","wikidata":"https://www.wikidata.org/wiki/Q1291200","display_name":"Mobile malware","level":3,"score":0.5970050692558289},{"id":"https://openalex.org/C108010975","wikidata":"https://www.wikidata.org/wiki/Q500094","display_name":"Pruning","level":2,"score":0.534249484539032},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.5333079695701599},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5242969393730164},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5186659097671509},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5082730650901794},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.49123328924179077},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4855008125305176},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4758153557777405},{"id":"https://openalex.org/C153646914","wikidata":"https://www.wikidata.org/wiki/Q535695","display_name":"Cellular network","level":2,"score":0.47544217109680176},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4381113052368164},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4201244115829468},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3602052927017212},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.26579582691192627},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1709648072719574},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11028197407722473},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09598788619041443},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2016.7795377","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2016.7795377","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2016 - 2016 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/3","score":0.8500000238418579,"display_name":"Good health and well-being"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W121699016","https://openalex.org/W215548390","https://openalex.org/W1498585374","https://openalex.org/W1641348531","https://openalex.org/W1969197441","https://openalex.org/W1980065740","https://openalex.org/W2022788571","https://openalex.org/W2031006315","https://openalex.org/W2031849950","https://openalex.org/W2045967620","https://openalex.org/W2058326131","https://openalex.org/W2066983820","https://openalex.org/W2074343878","https://openalex.org/W2074936970","https://openalex.org/W2090554969","https://openalex.org/W2105176326","https://openalex.org/W2111817346","https://openalex.org/W2139346593","https://openalex.org/W2148301044","https://openalex.org/W2166481478","https://openalex.org/W2171112017","https://openalex.org/W2214156594","https://openalex.org/W2288112645","https://openalex.org/W6604959065","https://openalex.org/W6608647898","https://openalex.org/W6629791766"],"related_works":["https://openalex.org/W2538622067","https://openalex.org/W2181494682","https://openalex.org/W3114159050","https://openalex.org/W2484248966","https://openalex.org/W4245250093","https://openalex.org/W4244354662","https://openalex.org/W4200054778","https://openalex.org/W2777464647","https://openalex.org/W2965539362","https://openalex.org/W2717179875"],"abstract_inverted_index":{"Proximity-based":[0],"malware,":[1],"such":[2],"as":[3],"cyber":[4,74],"cellphone":[5],"worms":[6],"and":[7,50,115],"trojans,":[8],"has":[9],"been":[10],"identified":[11],"to":[12,20,32,71,86,102,122],"be":[13,120],"one":[14],"of":[15,30,36,45,48,67,91,126,149],"the":[16,25,34,46,88,124],"serious":[17],"open":[18],"threats":[19],"wireless":[21,38],"networks":[22],"operating":[23],"at":[24],"tactical":[26,78,155],"edge.":[27],"The":[28],"ability":[29],"malware":[31,127,151],"exploit":[33],"vulnerabilities":[35],"a":[37,43,61,110,129,153],"mobile":[39,131],"platform":[40,68],"is":[41],"often":[42],"function":[44],"mix":[47],"software":[49],"hardware":[51],"which":[52,64],"define":[53],"its":[54],"platform.":[55],"In":[56],"this":[57,107],"paper,":[58],"we":[59,108],"utilize":[60],"proactive":[62],"strategy":[63,81],"takes":[65],"advantage":[66],"diversity":[69,113],"metrics":[70],"defend":[72],"against":[73],"worm":[75],"attacks":[76],"in":[77,128,152],"networks.":[79],"This":[80],"uses":[82],"dynamic":[83],"K-Distance":[84],"pruning":[85],"minimize":[87],"total":[89],"number":[90],"shared":[92],"edges":[93],"between":[94,136],"nodes":[95],"with":[96,138],"similar":[97,139],"platforms":[98],"while":[99],"retaining":[100],"access":[101],"mission-critical":[103],"services.":[104],"To":[105],"achieve":[106],"introduce":[109],"new":[111],"neighborhood":[112],"metric":[114],"show":[116],"how":[117],"it":[118],"can":[119],"used":[121],"limit":[123],"spread":[125],"multi-platform":[130],"network":[132],"by":[133],"reducing":[134],"contact":[135],"machines":[137],"vulnerabilities.":[140],"We":[141],"test":[142],"our":[143],"assumptions":[144],"via":[145],"an":[146],"agent-based":[147],"simulation":[148],"epidemic":[150],"synthetic":[154],"network.":[156]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
