{"id":"https://openalex.org/W4403598942","doi":"https://doi.org/10.1109/tce.2024.3476036","title":"Predicting Propagation of Stealthy Worm for Unknown Source in Mobile-Edge Computing","display_name":"Predicting Propagation of Stealthy Worm for Unknown Source in Mobile-Edge Computing","publication_year":2024,"publication_date":"2024-10-21","ids":{"openalex":"https://openalex.org/W4403598942","doi":"https://doi.org/10.1109/tce.2024.3476036"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2024.3476036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3476036","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101648128","display_name":"Yanwei Sun","orcid":"https://orcid.org/0000-0002-7024-7573"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanwei Sun","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002837571","display_name":"Fei Ren","orcid":"https://orcid.org/0000-0002-9498-8675"},"institutions":[{"id":"https://openalex.org/I4210139507","display_name":"State Nuclear Power Technology Company (China)","ror":"https://ror.org/03pydjx38","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210139507"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Ren","raw_affiliation_strings":["Public Technology Service Department, State Information Center, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Public Technology Service Department, State Information Center, Beijing, China","institution_ids":["https://openalex.org/I4210139507"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100841554","display_name":"Jian Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I4210100976","display_name":"BOE Technology Group (China)","ror":"https://ror.org/01cwwvj38","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210100976"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Sun","raw_affiliation_strings":["Qi An Xin Technology Group Company Ltd., Beijing, China"],"affiliations":[{"raw_affiliation_string":"Qi An Xin Technology Group Company Ltd., Beijing, China","institution_ids":["https://openalex.org/I4210100976"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053828876","display_name":"Zuodong Liang","orcid":"https://orcid.org/0000-0002-0787-0418"},"institutions":[{"id":"https://openalex.org/I4210160629","display_name":"China Information Technology Security Evaluation Center","ror":"https://ror.org/053cexp66","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210160629"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiyi Liang","raw_affiliation_strings":["CNITSEC, Beijing, China"],"affiliations":[{"raw_affiliation_string":"CNITSEC, Beijing, China","institution_ids":["https://openalex.org/I4210160629"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034188972","display_name":"Jiapeng Zhao","orcid":"https://orcid.org/0009-0002-5673-9632"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiapeng Zhao","raw_affiliation_strings":["School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101648128"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20125186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"72","issue":"1","first_page":"1087","last_page":"1098"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5839999914169312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.5839999914169312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.5216000080108643,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7108163237571716},{"id":"https://openalex.org/keywords/mobile-edge-computing","display_name":"Mobile edge computing","score":0.528080940246582},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.49578890204429626},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.480217307806015},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.46662792563438416},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.46529802680015564},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.379294216632843},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.31757527589797974},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2420763075351715},{"id":"https://openalex.org/keywords/mobile-radio","display_name":"Mobile radio","score":0.21509301662445068}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7108163237571716},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.528080940246582},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.49578890204429626},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.480217307806015},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.46662792563438416},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.46529802680015564},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.379294216632843},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31757527589797974},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2420763075351715},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.21509301662445068}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2024.3476036","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2024.3476036","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4361251304","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W3024547383","https://openalex.org/W4210813012","https://openalex.org/W2914646191","https://openalex.org/W3174690704","https://openalex.org/W4386004629","https://openalex.org/W2968424451","https://openalex.org/W4221092438"],"abstract_inverted_index":{"While":[0],"improving":[1],"network":[2],"performance,":[3],"Mobile":[4],"Edge":[5],"Computing":[6],"(MEC)":[7],"faces":[8],"significant":[9],"security":[10,50],"threats":[11],"due":[12],"to":[13,25,55,89,109,128,147,175],"User":[14],"Equipment":[15],"(UE)":[16],"vulnerabilities":[17],"and":[18,33,45,59,94,132,153,161,179],"insecure":[19],"communication":[20],"protocols.":[21],"This":[22],"enables":[23],"attackers":[24],"insert":[26],"malicious":[27],"nodes":[28,131],"into":[29],"the":[30,38,111,134,138,150,155,159,177],"entire":[31],"system":[32],"propagate":[34],"worms":[35,74,79,115],"such":[36],"as":[37],"Mirai,":[39],"enabling":[40],"activities":[41],"like":[42],"DDoS":[43],"attacks":[44],"cryptocurrency":[46],"mining.":[47],"To":[48,98],"reduce":[49,149],"risks,":[51],"it":[52,87],"is":[53,126],"necessary":[54],"identify":[56],"worm":[57],"sources":[58],"predict":[60,95],"their":[61,92,96],"propagation":[62,112,139],"accurately.":[63],"However,":[64],"in":[65,169],"practice,":[66],"there":[67],"exist":[68],"a":[69,105,121,144,165],"large":[70],"number":[71],"of":[72,113,136,157,167,181],"stealthy":[73,78,114],"(nodes":[75],"that":[76],"infect":[77],"work":[80],"without":[81],"exhibiting":[82],"any":[83],"abnormal":[84],"behavior),":[85],"making":[86],"challenging":[88],"accurately":[90],"analyze":[91,110],"source":[93],"propagation.":[97],"address":[99],"this":[100],"problem,":[101],"our":[102,182],"paper":[103],"introduces":[104],"prediction":[106],"scheme":[107],"designed":[108,127],"originating":[116],"from":[117],"unknown":[118],"sources.":[119,140],"First,":[120],"Bayes":[122],"rule-based":[123],"observation":[124],"algorithm":[125,146],"correct":[129],"false-negative":[130],"increase":[133],"accuracy":[135,178],"identifying":[137],"Then,":[141],"we":[142],"design":[143],"branch-and-bound":[145],"effectively":[148],"traversal":[151],"space":[152],"improve":[154],"efficiency":[156,180],"calculating":[158],"upper":[160],"lower":[162],"bounds.":[163],"Finally,":[164],"series":[166],"experiments":[168],"four":[170],"real":[171],"networks":[172],"are":[173],"conducted":[174],"show":[176],"scheme.":[183]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-10-10T00:00:00"}
