{"id":"https://openalex.org/W4414603384","doi":"https://doi.org/10.1109/tase.2025.3614747","title":"Hybrid Control Strategies for Mitigating Covert Malware Spread in Heterogeneous Networks","display_name":"Hybrid Control Strategies for Mitigating Covert Malware Spread in Heterogeneous Networks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414603384","doi":"https://doi.org/10.1109/tase.2025.3614747"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2025.3614747","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2025.3614747","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033744433","display_name":"Baihao Peng","orcid":"https://orcid.org/0000-0002-1280-1951"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baihao Peng","raw_affiliation_strings":["School of Automation Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054756309","display_name":"Junfeng Liu","orcid":"https://orcid.org/0000-0001-5772-7372"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junfeng Liu","raw_affiliation_strings":["School of Automation Science and Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Automation Science and Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062004910","display_name":"Jun Zeng","orcid":"https://orcid.org/0000-0002-5270-4814"},"institutions":[{"id":"https://openalex.org/I90610280","display_name":"South China University of Technology","ror":"https://ror.org/0530pts50","country_code":"CN","type":"education","lineage":["https://openalex.org/I90610280"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Zeng","raw_affiliation_strings":["School of Electric Power Engineering, South China University of Technology, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electric Power Engineering, South China University of Technology, Guangzhou, China","institution_ids":["https://openalex.org/I90610280"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033744433"],"corresponding_institution_ids":["https://openalex.org/I90610280"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30258879,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":null,"first_page":"22198","last_page":"22217"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8294000029563904},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6586999893188477},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.47360000014305115},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4700999855995178},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4075999855995178},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.3723999857902527},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.3409000039100647},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.32670000195503235}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8294000029563904},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7814000248908997},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6586999893188477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5407000184059143},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.47360000014305115},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4700999855995178},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4075999855995178},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37459999322891235},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.3723999857902527},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3571999967098236},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.3409000039100647},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.32670000195503235},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.3181000053882599},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.29750001430511475},{"id":"https://openalex.org/C2778579508","wikidata":"https://www.wikidata.org/wiki/Q722192","display_name":"System call","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2825999855995178},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.25369998812675476},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.2531000077724457}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tase.2025.3614747","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2025.3614747","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2835147668","display_name":null,"funder_award_id":"2023A1111120023","funder_id":"https://openalex.org/F4320335795","funder_display_name":"Science and Technology Planning Project of Guangdong Province"},{"id":"https://openalex.org/G324058474","display_name":null,"funder_award_id":"2024A1515012428","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G3297795442","display_name":null,"funder_award_id":"2024A1515011158","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G5729133428","display_name":null,"funder_award_id":"52377186","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320335795","display_name":"Science and Technology Planning Project of Guangdong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W231975775","https://openalex.org/W1881704565","https://openalex.org/W1995608339","https://openalex.org/W2076226162","https://openalex.org/W2119451500","https://openalex.org/W2144301074","https://openalex.org/W2148301044","https://openalex.org/W2398023307","https://openalex.org/W2441196741","https://openalex.org/W2463079943","https://openalex.org/W2481872069","https://openalex.org/W2892082426","https://openalex.org/W2907755207","https://openalex.org/W2921750014","https://openalex.org/W2963142125","https://openalex.org/W2964280920","https://openalex.org/W2971541370","https://openalex.org/W2972175715","https://openalex.org/W2974175382","https://openalex.org/W2999203289","https://openalex.org/W3002392201","https://openalex.org/W3002700665","https://openalex.org/W3010882303","https://openalex.org/W3087957788","https://openalex.org/W3190437797","https://openalex.org/W3199160981","https://openalex.org/W3199919711","https://openalex.org/W4320717600","https://openalex.org/W4383163241","https://openalex.org/W4387623768","https://openalex.org/W4388579573","https://openalex.org/W4391123297","https://openalex.org/W4391731001","https://openalex.org/W4395688020","https://openalex.org/W4399426689","https://openalex.org/W4400730021","https://openalex.org/W4402830044","https://openalex.org/W4404102498","https://openalex.org/W4404809264","https://openalex.org/W4405974269","https://openalex.org/W4406202106","https://openalex.org/W4408434967","https://openalex.org/W4409019041","https://openalex.org/W4411203705","https://openalex.org/W4411854357"],"related_works":[],"abstract_inverted_index":{"In":[0,85],"the":[1,45,57,62,81,90,98,118,130,144,161,184,234],"current":[2],"era":[3],"of":[4,47,92,100,120,133,163,171],"information":[5],"explosion,":[6],"cybersecurity":[7,25],"challenges":[8],"have":[9],"become":[10],"increasingly":[11],"prominent.":[12],"Compared":[13],"to":[14,79,87,116,139,160,216],"malware":[15,21,101,196,228],"that":[16,183],"causes":[17],"direct":[18],"attacks,":[19],"covert":[20,49],"poses":[22],"a":[23,72,124,198],"significant":[24],"threat":[26],"as":[27,151,153],"it":[28],"can":[29],"remain":[30],"hidden":[31],"within":[32],"networks":[33],"for":[34],"extended":[35],"periods":[36],"while":[37],"stealthily":[38],"stealing":[39],"users\u2019":[40],"private":[41],"information.":[42],"To":[43],"address":[44],"challenge":[46],"clearing":[48],"malware,":[50],"this":[51,136],"study":[52],"proposes":[53],"two":[54],"defense":[55,157],"mechanisms:":[56],"Patch":[58],"Propagation":[59],"Mechanism":[60,64],"(PPM)":[61],"aSleep-aWake":[63],"(SWM).":[65],"Based":[66],"on":[67,111],"these":[68,172],"mechanisms,":[69],"we":[70,122,147],"develop":[71],"mean-field":[73],"two-layer":[74],"propagation":[75,200],"model,":[76],"SW-VIPU":[77,134],"(aSleep-aWake-Vulnerable-Infected-Patched-Unaware),":[78],"analyze":[80,129],"network\u2019s":[82],"dynamic":[83,131,156,186],"evolution.":[84],"addition":[86],"theoretical":[88],"analysis,":[89],"effectiveness":[91,170],"PPM":[93],"and":[94,109,128,142,211,219,247],"SWM":[95],"in":[96,191],"curbing":[97],"spread":[99,229],"is":[102,174,231],"validated":[103],"through":[104,176],"comparisons":[105],"with":[106],"existing":[107],"models":[108],"simulations":[110],"real-world":[112],"network":[113],"topologies.":[114],"Subsequently,":[115],"enhance":[117],"performance":[119,132],"SWM,":[121],"introduce":[123,148],"multi-pulse":[125],"control":[126,145,166],"mechanism":[127],"under":[135],"mechanism.":[137],"Finally,":[138],"comprehensively":[140],"explore":[141],"improve":[143],"effectiveness,":[146],"static":[149,189],"strategies":[150,167],"well":[152],"an":[154],"objective-function-based":[155],"framework,":[158],"leading":[159],"development":[162],"several":[164],"hybrid":[165],"(HCSs).":[168],"The":[169,179],"HCSs":[173,187,190],"confirmed":[175],"simulation":[177],"experiments.":[178],"experimental":[180],"results":[181],"demonstrate":[182],"proposed":[185],"outperform":[188],"most":[192],"scenarios.":[193],"Furthermore,":[194],"when":[195,227],"exhibits":[197],"high":[199],"capability,":[201],"patches":[202],"should":[203,213,237,249],"be":[204,214,220,239,251],"deployed":[205],"at":[206,241],"their":[207],"maximum":[208],"deployment":[209],"output,":[210],"users":[212],"forced":[215],"log":[217],"out":[218],"prohibited":[221],"from":[222],"logging":[223],"back":[224],"in.":[225],"Conversely,":[226],"capability":[230],"weaker,":[232],"although":[233],"patch":[235],"output":[236],"still":[238],"maintained":[240],"its":[242],"highest":[243],"level,":[244],"user":[245],"logins":[246],"logouts":[248],"not":[250],"restricted.":[252]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
