{"id":"https://openalex.org/W1976506837","doi":"https://doi.org/10.1109/tifs.2014.2359333","title":"Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks","display_name":"Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks","publication_year":2014,"publication_date":"2014-09-19","ids":{"openalex":"https://openalex.org/W1976506837","doi":"https://doi.org/10.1109/tifs.2014.2359333","mag":"1976506837"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2359333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2359333","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030903260","display_name":"Shigen Shen","orcid":"https://orcid.org/0000-0002-7558-5379"},"institutions":[{"id":"https://openalex.org/I4210092870","display_name":"Jiaxing University","ror":"https://ror.org/00j2a7k55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092870"]},{"id":"https://openalex.org/I192209268","display_name":"Shaoxing University","ror":"https://ror.org/0435tej63","country_code":"CN","type":"education","lineage":["https://openalex.org/I192209268"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shigen Shen","raw_affiliation_strings":["College of Engineering, Shaoxing University, Shaoxing, China","College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing, China"],"affiliations":[{"raw_affiliation_string":"College of Engineering, Shaoxing University, Shaoxing, China","institution_ids":["https://openalex.org/I192209268"]},{"raw_affiliation_string":"College of Mathematics, Physics and Information Engineering, Jiaxing University, Jiaxing, China","institution_ids":["https://openalex.org/I4210092870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100631984","display_name":"Hongjie Li","orcid":"https://orcid.org/0000-0002-2770-2227"},"institutions":[{"id":"https://openalex.org/I4210092870","display_name":"Jiaxing University","ror":"https://ror.org/00j2a7k55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092870"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongjie Li","raw_affiliation_strings":["College of Mathematics, Physics and Information Engineering, Jiaxing University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics, Physics and Information Engineering, Jiaxing University, China","institution_ids":["https://openalex.org/I4210092870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032167385","display_name":"Risheng Han","orcid":"https://orcid.org/0000-0002-6135-0878"},"institutions":[{"id":"https://openalex.org/I4210092870","display_name":"Jiaxing University","ror":"https://ror.org/00j2a7k55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210092870"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Risheng Han","raw_affiliation_strings":["College of Mathematics, Physics and Information Engineering, Jiaxing University, China"],"affiliations":[{"raw_affiliation_string":"College of Mathematics, Physics and Information Engineering, Jiaxing University, China","institution_ids":["https://openalex.org/I4210092870"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074022699","display_name":"Athanasios V. Vasilakos","orcid":"https://orcid.org/0000-0003-1902-9877"},"institutions":[{"id":"https://openalex.org/I36721946","display_name":"Kuwait University","ror":"https://ror.org/021e5j056","country_code":"KW","type":"education","lineage":["https://openalex.org/I36721946"]}],"countries":["KW"],"is_corresponding":false,"raw_author_name":"Athanasios V. Vasilakos","raw_affiliation_strings":["Department of Computer Science, Kuwait University, Safat, Kuwait"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Kuwait University, Safat, Kuwait","institution_ids":["https://openalex.org/I36721946"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100428928","display_name":"Yihan Wang","orcid":"https://orcid.org/0000-0002-0407-1776"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]},{"id":"https://openalex.org/I141962983","display_name":"Shanghai University of Engineering Science","ror":"https://ror.org/0557b9y08","country_code":"CN","type":"education","lineage":["https://openalex.org/I141962983"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yihan Wang","raw_affiliation_strings":["College of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China","College of Information Science and Technology, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Electronic and Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China","institution_ids":["https://openalex.org/I141962983"]},{"raw_affiliation_string":"College of Information Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065024360","display_name":"Qiying Cao","orcid":"https://orcid.org/0000-0001-7976-6364"},"institutions":[{"id":"https://openalex.org/I181326427","display_name":"Donghua University","ror":"https://ror.org/035psfh38","country_code":"CN","type":"education","lineage":["https://openalex.org/I181326427"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiying Cao","raw_affiliation_strings":["College of Computer Science and Technology, Donghua University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Donghua University, Shanghai, China","institution_ids":["https://openalex.org/I181326427"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5030903260"],"corresponding_institution_ids":["https://openalex.org/I192209268","https://openalex.org/I4210092870"],"apc_list":null,"apc_paid":null,"fwci":6.8962,"has_fulltext":false,"cited_by_count":97,"citation_normalized_percentile":{"value":0.97022868,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"9","issue":"11","first_page":"1962","last_page":"1973"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.8384687900543213},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8059808015823364},{"id":"https://openalex.org/keywords/differential-game","display_name":"Differential game","score":0.6657847762107849},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6074633002281189},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.45287027955055237},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38977131247520447},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2920876741409302},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.24842113256454468},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07889223098754883}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.8384687900543213},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8059808015823364},{"id":"https://openalex.org/C2779006483","wikidata":"https://www.wikidata.org/wiki/Q1973196","display_name":"Differential game","level":2,"score":0.6657847762107849},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6074633002281189},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.45287027955055237},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38977131247520447},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2920876741409302},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.24842113256454468},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07889223098754883}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2014.2359333","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2359333","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.800000011920929,"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3"}],"awards":[{"id":"https://openalex.org/G4671368781","display_name":null,"funder_award_id":"61272034","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1539403428","https://openalex.org/W1963876301","https://openalex.org/W1964633575","https://openalex.org/W1965606406","https://openalex.org/W1970601741","https://openalex.org/W1972771043","https://openalex.org/W1976309217","https://openalex.org/W1996126437","https://openalex.org/W2008588420","https://openalex.org/W2016358068","https://openalex.org/W2041811087","https://openalex.org/W2049222678","https://openalex.org/W2050642268","https://openalex.org/W2053225008","https://openalex.org/W2061020560","https://openalex.org/W2062757535","https://openalex.org/W2066341982","https://openalex.org/W2067064328","https://openalex.org/W2069484364","https://openalex.org/W2083594366","https://openalex.org/W2084858364","https://openalex.org/W2090119438","https://openalex.org/W2108986857","https://openalex.org/W2109148997","https://openalex.org/W2109643625","https://openalex.org/W2111639385","https://openalex.org/W2116164611","https://openalex.org/W2118847774","https://openalex.org/W2121688802","https://openalex.org/W2148495758","https://openalex.org/W2151314039","https://openalex.org/W2156796265","https://openalex.org/W2158078329","https://openalex.org/W2169017746","https://openalex.org/W2170239483","https://openalex.org/W2217944714","https://openalex.org/W2888914392","https://openalex.org/W3104341217","https://openalex.org/W4211043782","https://openalex.org/W4236402791"],"related_works":["https://openalex.org/W2366107444","https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W4388145910","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W3152891574","https://openalex.org/W2249809453","https://openalex.org/W4366249425"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,14,20,136],"networks":[2],"(WSNs)":[3],"are":[4,124,133],"prone":[5],"to":[6,26,48,84,98,159,175],"propagating":[7],"malware":[8,37,62,91,167,177],"because":[9],"of":[10,13,41,106,145],"special":[11],"characteristics":[12],"nodes.":[15,137],"Considering":[16],"the":[17,50,56,77,86,90,104,107,110,119,143,156,166],"fact":[18],"that":[19,127,141,150],"nodes":[21],"periodically":[22],"enter":[23],"sleep":[24],"mode":[25],"save":[27],"energy,":[28],"we":[29,69,113],"develop":[30],"traditional":[31],"epidemic":[32],"theory":[33],"and":[34,61,121,132,163],"construct":[35],"a":[36,71,160,172],"propagation":[38,144],"model":[39],"consisting":[40],"seven":[42],"states.":[43,53],"We":[44,54,102,147],"formulate":[45,70],"differential":[46,73],"equations":[47],"represent":[49],"dynamics":[51],"between":[52,59],"view":[55],"decision-making":[57],"problem":[58],"system":[60,78,120],"as":[63],"an":[64],"optimal":[65,115,151],"control":[66],"problem;":[67],"therefore,":[68],"malware-defense":[72],"game":[74],"in":[75,109,178],"which":[76,123],"can":[79,128,154,164],"dynamically":[80],"choose":[81],"its":[82,94],"strategies":[83,95,117,153],"minimize":[85],"overall":[87,157],"cost":[88,158],"whereas":[89],"intelligently":[92],"varies":[93],"over":[96],"time":[97],"maximize":[99],"this":[100],"cost.":[101],"prove":[103],"existence":[105],"saddle-point":[108],"game.":[111],"Further,":[112],"attain":[114],"dynamic":[116,152],"for":[118,135],"malware,":[122],"bang-bang":[125],"controls":[126],"be":[129],"conveniently":[130],"operated":[131],"suitable":[134],"Experiments":[138],"identify":[139],"factors":[140],"influence":[142],"malware.":[146],"also":[148],"determine":[149],"reduce":[155],"certain":[161],"extent":[162],"suppress":[165],"propagation.":[168],"These":[169],"results":[170],"support":[171],"theoretical":[173],"foundation":[174],"limit":[176],"WSNs.":[179]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
